Dec 13 14:31:32.074231 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:31:32.074256 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:32.074265 kernel: BIOS-provided physical RAM map: Dec 13 14:31:32.074270 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:31:32.074278 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 14:31:32.074285 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 14:31:32.074293 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 14:31:32.074299 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 14:31:32.074308 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 14:31:32.074314 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 14:31:32.074320 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 14:31:32.074325 kernel: printk: bootconsole [earlyser0] enabled Dec 13 14:31:32.074334 kernel: NX (Execute Disable) protection: active Dec 13 14:31:32.074340 kernel: efi: EFI v2.70 by Microsoft Dec 13 14:31:32.074351 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c7a98 RNG=0x3ffd1018 Dec 13 14:31:32.074359 kernel: random: crng init done Dec 13 14:31:32.074365 kernel: SMBIOS 3.1.0 present. Dec 13 14:31:32.074372 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 14:31:32.074380 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 14:31:32.074386 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 14:31:32.074394 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 14:31:32.074402 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 14:31:32.074410 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 14:31:32.074418 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 14:31:32.074425 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 14:31:32.074431 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 14:31:32.074440 kernel: tsc: Detected 2593.903 MHz processor Dec 13 14:31:32.074448 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:31:32.074454 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:31:32.074462 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 14:31:32.074470 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:31:32.074476 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 14:31:32.074487 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 14:31:32.074494 kernel: Using GB pages for direct mapping Dec 13 14:31:32.074500 kernel: Secure boot disabled Dec 13 14:31:32.074509 kernel: ACPI: Early table checksum verification disabled Dec 13 14:31:32.074515 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 14:31:32.074522 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074531 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074538 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 14:31:32.074552 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 14:31:32.074559 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074566 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074575 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074582 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074590 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074602 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074609 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:31:32.074619 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 14:31:32.074627 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 14:31:32.074636 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 14:31:32.074644 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 14:31:32.074653 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 14:31:32.074662 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 14:31:32.074673 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 14:31:32.074681 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 14:31:32.074690 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 14:31:32.074697 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 14:31:32.074705 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:31:32.074713 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:31:32.074720 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 14:31:32.074729 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 14:31:32.074737 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 14:31:32.074746 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 14:31:32.074756 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 14:31:32.074762 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 14:31:32.074769 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 14:31:32.074778 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 14:31:32.074785 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 14:31:32.074792 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 14:31:32.074809 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 14:31:32.074815 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 14:31:32.074827 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 14:31:32.074835 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 14:31:32.074842 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 14:31:32.074852 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 14:31:32.074859 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 14:31:32.074867 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 14:31:32.074876 kernel: Zone ranges: Dec 13 14:31:32.074883 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:31:32.074891 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:31:32.074902 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:31:32.074908 kernel: Movable zone start for each node Dec 13 14:31:32.074919 kernel: Early memory node ranges Dec 13 14:31:32.074926 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:31:32.074933 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 14:31:32.074942 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 14:31:32.074949 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:31:32.074957 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 14:31:32.074966 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:31:32.074974 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:31:32.074984 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 14:31:32.074991 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 14:31:32.074998 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 14:31:32.075008 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:31:32.075015 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:31:32.075023 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:31:32.075032 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 14:31:32.075042 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:31:32.075052 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 14:31:32.075060 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 14:31:32.075071 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:31:32.075079 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:31:32.075087 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:31:32.075097 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:31:32.075103 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:31:32.075110 kernel: Hyper-V: PV spinlocks enabled Dec 13 14:31:32.075120 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:31:32.075128 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 14:31:32.075138 kernel: Policy zone: Normal Dec 13 14:31:32.075146 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:32.075154 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:31:32.075163 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:31:32.075170 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:31:32.075178 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:31:32.075187 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 308056K reserved, 0K cma-reserved) Dec 13 14:31:32.075195 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:31:32.075205 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:31:32.075220 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:31:32.075230 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:31:32.075238 kernel: rcu: RCU event tracing is enabled. Dec 13 14:31:32.075249 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:31:32.075256 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:31:32.075265 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:31:32.075274 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:31:32.075281 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:31:32.075291 kernel: Using NULL legacy PIC Dec 13 14:31:32.075300 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 14:31:32.075309 kernel: Console: colour dummy device 80x25 Dec 13 14:31:32.075318 kernel: printk: console [tty1] enabled Dec 13 14:31:32.075325 kernel: printk: console [ttyS0] enabled Dec 13 14:31:32.075335 kernel: printk: bootconsole [earlyser0] disabled Dec 13 14:31:32.075344 kernel: ACPI: Core revision 20210730 Dec 13 14:31:32.075353 kernel: Failed to register legacy timer interrupt Dec 13 14:31:32.075361 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:31:32.075368 kernel: Hyper-V: Using IPI hypercalls Dec 13 14:31:32.075379 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.80 BogoMIPS (lpj=2593903) Dec 13 14:31:32.075387 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:31:32.075394 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:31:32.075401 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:31:32.075408 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:31:32.075416 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:31:32.075427 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:31:32.075434 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:31:32.075443 kernel: RETBleed: Vulnerable Dec 13 14:31:32.075452 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:31:32.075462 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:31:32.075470 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:31:32.075479 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:31:32.075489 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:31:32.075497 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:31:32.075506 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:31:32.075518 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:31:32.075525 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:31:32.075535 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:31:32.075543 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:31:32.075550 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 14:31:32.075560 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 14:31:32.075567 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 14:31:32.075576 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 14:31:32.075585 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:31:32.075592 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:31:32.075601 kernel: LSM: Security Framework initializing Dec 13 14:31:32.075610 kernel: SELinux: Initializing. Dec 13 14:31:32.075620 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:31:32.075629 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:31:32.075636 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:31:32.075647 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:31:32.075654 kernel: signal: max sigframe size: 3632 Dec 13 14:31:32.075662 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:31:32.075672 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:31:32.075679 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:31:32.075688 kernel: x86: Booting SMP configuration: Dec 13 14:31:32.075696 kernel: .... node #0, CPUs: #1 Dec 13 14:31:32.075706 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 14:31:32.075717 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:31:32.075724 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:31:32.075734 kernel: smpboot: Max logical packages: 1 Dec 13 14:31:32.075741 kernel: smpboot: Total of 2 processors activated (10375.61 BogoMIPS) Dec 13 14:31:32.075749 kernel: devtmpfs: initialized Dec 13 14:31:32.075759 kernel: x86/mm: Memory block size: 128MB Dec 13 14:31:32.075766 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 14:31:32.075779 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:31:32.075786 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:31:32.075801 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:31:32.075809 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:31:32.075817 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:31:32.075826 kernel: audit: type=2000 audit(1734100291.024:1): state=initialized audit_enabled=0 res=1 Dec 13 14:31:32.075833 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:31:32.075843 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:31:32.075851 kernel: cpuidle: using governor menu Dec 13 14:31:32.075864 kernel: ACPI: bus type PCI registered Dec 13 14:31:32.075874 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:31:32.075883 kernel: dca service started, version 1.12.1 Dec 13 14:31:32.075892 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:31:32.075901 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:31:32.075912 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:31:32.075919 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:31:32.075926 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:31:32.075936 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:31:32.075945 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:31:32.075956 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:31:32.075964 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:31:32.075974 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:31:32.075984 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:31:32.075994 kernel: ACPI: Interpreter enabled Dec 13 14:31:32.076003 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:31:32.076015 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:31:32.076024 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:31:32.076036 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 14:31:32.076046 kernel: iommu: Default domain type: Translated Dec 13 14:31:32.076053 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:31:32.076062 kernel: vgaarb: loaded Dec 13 14:31:32.076070 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:31:32.076077 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:31:32.076088 kernel: PTP clock support registered Dec 13 14:31:32.076096 kernel: Registered efivars operations Dec 13 14:31:32.076106 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:31:32.076116 kernel: PCI: System does not support PCI Dec 13 14:31:32.076127 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 14:31:32.076136 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:31:32.076147 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:31:32.076154 kernel: pnp: PnP ACPI init Dec 13 14:31:32.076163 kernel: pnp: PnP ACPI: found 3 devices Dec 13 14:31:32.076173 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:31:32.076183 kernel: NET: Registered PF_INET protocol family Dec 13 14:31:32.076192 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:31:32.076205 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:31:32.076215 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:31:32.076227 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:31:32.076238 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:31:32.076250 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:31:32.076261 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:31:32.076273 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:31:32.076284 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:31:32.076297 kernel: NET: Registered PF_XDP protocol family Dec 13 14:31:32.076313 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:31:32.076326 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:31:32.076339 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 14:31:32.076351 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:31:32.076364 kernel: Initialise system trusted keyrings Dec 13 14:31:32.076376 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:31:32.076387 kernel: Key type asymmetric registered Dec 13 14:31:32.076400 kernel: Asymmetric key parser 'x509' registered Dec 13 14:31:32.076411 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:31:32.076425 kernel: io scheduler mq-deadline registered Dec 13 14:31:32.076434 kernel: io scheduler kyber registered Dec 13 14:31:32.076444 kernel: io scheduler bfq registered Dec 13 14:31:32.076455 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:31:32.076463 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:31:32.076472 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:31:32.076480 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:31:32.076489 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:31:32.076622 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 14:31:32.076711 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T14:31:31 UTC (1734100291) Dec 13 14:31:32.076819 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 14:31:32.076830 kernel: fail to initialize ptp_kvm Dec 13 14:31:32.076837 kernel: intel_pstate: CPU model not supported Dec 13 14:31:32.076844 kernel: efifb: probing for efifb Dec 13 14:31:32.076852 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:31:32.076859 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:31:32.076866 kernel: efifb: scrolling: redraw Dec 13 14:31:32.076876 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:31:32.076883 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:31:32.076892 kernel: fb0: EFI VGA frame buffer device Dec 13 14:31:32.076901 kernel: pstore: Registered efi as persistent store backend Dec 13 14:31:32.076908 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:31:32.076917 kernel: Segment Routing with IPv6 Dec 13 14:31:32.076925 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:31:32.076936 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:31:32.076943 kernel: Key type dns_resolver registered Dec 13 14:31:32.076955 kernel: IPI shorthand broadcast: enabled Dec 13 14:31:32.076963 kernel: sched_clock: Marking stable (784348300, 20933000)->(1033141600, -227860300) Dec 13 14:31:32.076973 kernel: registered taskstats version 1 Dec 13 14:31:32.076980 kernel: Loading compiled-in X.509 certificates Dec 13 14:31:32.076990 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:31:32.076998 kernel: Key type .fscrypt registered Dec 13 14:31:32.077008 kernel: Key type fscrypt-provisioning registered Dec 13 14:31:32.077016 kernel: pstore: Using crash dump compression: deflate Dec 13 14:31:32.077028 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:31:32.077036 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:31:32.077046 kernel: ima: No architecture policies found Dec 13 14:31:32.077053 kernel: clk: Disabling unused clocks Dec 13 14:31:32.077064 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:31:32.077072 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:31:32.077081 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:31:32.077089 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:31:32.077099 kernel: Run /init as init process Dec 13 14:31:32.077108 kernel: with arguments: Dec 13 14:31:32.077119 kernel: /init Dec 13 14:31:32.077126 kernel: with environment: Dec 13 14:31:32.077136 kernel: HOME=/ Dec 13 14:31:32.077144 kernel: TERM=linux Dec 13 14:31:32.077154 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:31:32.077163 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:31:32.077175 systemd[1]: Detected virtualization microsoft. Dec 13 14:31:32.077188 systemd[1]: Detected architecture x86-64. Dec 13 14:31:32.077196 systemd[1]: Running in initrd. Dec 13 14:31:32.077205 systemd[1]: No hostname configured, using default hostname. Dec 13 14:31:32.077213 systemd[1]: Hostname set to . Dec 13 14:31:32.077224 systemd[1]: Initializing machine ID from random generator. Dec 13 14:31:32.077232 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:31:32.077242 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:31:32.077251 systemd[1]: Reached target cryptsetup.target. Dec 13 14:31:32.077261 systemd[1]: Reached target paths.target. Dec 13 14:31:32.077270 systemd[1]: Reached target slices.target. Dec 13 14:31:32.077281 systemd[1]: Reached target swap.target. Dec 13 14:31:32.077291 systemd[1]: Reached target timers.target. Dec 13 14:31:32.077300 systemd[1]: Listening on iscsid.socket. Dec 13 14:31:32.077308 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:31:32.077318 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:31:32.077328 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:31:32.077338 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:31:32.077348 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:31:32.077357 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:31:32.077367 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:31:32.077375 systemd[1]: Reached target sockets.target. Dec 13 14:31:32.077385 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:31:32.077394 systemd[1]: Finished network-cleanup.service. Dec 13 14:31:32.077404 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:31:32.077412 systemd[1]: Starting systemd-journald.service... Dec 13 14:31:32.077422 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:31:32.077432 systemd[1]: Starting systemd-resolved.service... Dec 13 14:31:32.077443 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:31:32.077451 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:31:32.077461 kernel: audit: type=1130 audit(1734100292.059:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.077469 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:31:32.077480 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:31:32.077491 systemd-journald[183]: Journal started Dec 13 14:31:32.077539 systemd-journald[183]: Runtime Journal (/run/log/journal/438c3b2b4ff84a75b6b7a5659b252ffc) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:31:32.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.047293 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 14:31:32.096164 kernel: audit: type=1130 audit(1734100292.075:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.106747 systemd[1]: Started systemd-journald.service. Dec 13 14:31:32.109115 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:31:32.113725 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:31:32.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.132878 systemd-resolved[185]: Positive Trust Anchors: Dec 13 14:31:32.150235 kernel: audit: type=1130 audit(1734100292.100:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.150259 kernel: audit: type=1130 audit(1734100292.107:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.132890 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:31:32.132920 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:31:32.135540 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 14:31:32.137958 systemd[1]: Started systemd-resolved.service. Dec 13 14:31:32.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.152493 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:31:32.152761 systemd[1]: Reached target nss-lookup.target. Dec 13 14:31:32.176669 kernel: audit: type=1130 audit(1734100292.148:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.176694 kernel: audit: type=1130 audit(1734100292.148:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.190522 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:31:32.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.193622 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:31:32.207813 kernel: audit: type=1130 audit(1734100292.192:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.218023 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:31:32.226156 dracut-cmdline[201]: dracut-dracut-053 Dec 13 14:31:32.228920 kernel: Bridge firewalling registered Dec 13 14:31:32.228988 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 14:31:32.232906 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:31:32.271812 kernel: SCSI subsystem initialized Dec 13 14:31:32.296599 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:31:32.296652 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:31:32.301809 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:31:32.306050 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 14:31:32.308942 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:31:32.314575 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:31:32.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.336414 kernel: audit: type=1130 audit(1734100292.313:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.340813 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:31:32.344426 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:31:32.359644 kernel: audit: type=1130 audit(1734100292.346:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.375816 kernel: iscsi: registered transport (tcp) Dec 13 14:31:32.403571 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:31:32.403636 kernel: QLogic iSCSI HBA Driver Dec 13 14:31:32.432567 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:31:32.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.435940 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:31:32.488824 kernel: raid6: avx512x4 gen() 18426 MB/s Dec 13 14:31:32.508813 kernel: raid6: avx512x4 xor() 8236 MB/s Dec 13 14:31:32.528810 kernel: raid6: avx512x2 gen() 18331 MB/s Dec 13 14:31:32.548813 kernel: raid6: avx512x2 xor() 29959 MB/s Dec 13 14:31:32.567810 kernel: raid6: avx512x1 gen() 18281 MB/s Dec 13 14:31:32.587808 kernel: raid6: avx512x1 xor() 26822 MB/s Dec 13 14:31:32.607811 kernel: raid6: avx2x4 gen() 18219 MB/s Dec 13 14:31:32.626807 kernel: raid6: avx2x4 xor() 7352 MB/s Dec 13 14:31:32.646808 kernel: raid6: avx2x2 gen() 18249 MB/s Dec 13 14:31:32.666812 kernel: raid6: avx2x2 xor() 22246 MB/s Dec 13 14:31:32.685821 kernel: raid6: avx2x1 gen() 13957 MB/s Dec 13 14:31:32.705821 kernel: raid6: avx2x1 xor() 19447 MB/s Dec 13 14:31:32.726822 kernel: raid6: sse2x4 gen() 9401 MB/s Dec 13 14:31:32.746818 kernel: raid6: sse2x4 xor() 6940 MB/s Dec 13 14:31:32.766818 kernel: raid6: sse2x2 gen() 12678 MB/s Dec 13 14:31:32.786830 kernel: raid6: sse2x2 xor() 7337 MB/s Dec 13 14:31:32.806822 kernel: raid6: sse2x1 gen() 11217 MB/s Dec 13 14:31:32.831235 kernel: raid6: sse2x1 xor() 5559 MB/s Dec 13 14:31:32.831657 kernel: raid6: using algorithm avx512x4 gen() 18426 MB/s Dec 13 14:31:32.831952 kernel: raid6: .... xor() 8236 MB/s, rmw enabled Dec 13 14:31:32.837768 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:31:32.857820 kernel: xor: automatically using best checksumming function avx Dec 13 14:31:32.954823 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:31:32.963162 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:31:32.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.965000 audit: BPF prog-id=7 op=LOAD Dec 13 14:31:32.966000 audit: BPF prog-id=8 op=LOAD Dec 13 14:31:32.967396 systemd[1]: Starting systemd-udevd.service... Dec 13 14:31:32.982734 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 13 14:31:32.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.989339 systemd[1]: Started systemd-udevd.service. Dec 13 14:31:32.992498 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:31:33.010523 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Dec 13 14:31:33.041434 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:31:33.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:33.046642 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:31:33.080470 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:31:33.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:33.124817 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:31:33.154235 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:31:33.154306 kernel: AES CTR mode by8 optimization enabled Dec 13 14:31:33.164817 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 14:31:33.178813 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:31:33.202308 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:31:33.202365 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:31:33.210081 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:31:33.210128 kernel: scsi host1: storvsc_host_t Dec 13 14:31:33.214814 kernel: scsi host0: storvsc_host_t Dec 13 14:31:33.214883 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:31:33.223431 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:31:33.229816 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:31:33.248760 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:31:33.248807 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:31:33.257811 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:31:33.276465 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:31:33.284710 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:31:33.284724 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:31:33.303438 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:31:33.303618 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:31:33.303819 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:31:33.303977 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:31:33.304129 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:31:33.304286 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:31:33.304306 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:31:33.402818 kernel: hv_netvsc 7c1e5235-f070-7c1e-5235-f0707c1e5235 eth0: VF slot 1 added Dec 13 14:31:33.413817 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:31:33.419816 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (442) Dec 13 14:31:33.419855 kernel: hv_pci d9eff339-ece7-4bd8-90f6-3a8af26d0014: PCI VMBus probing: Using version 0x10004 Dec 13 14:31:33.512663 kernel: hv_pci d9eff339-ece7-4bd8-90f6-3a8af26d0014: PCI host bridge to bus ece7:00 Dec 13 14:31:33.512853 kernel: pci_bus ece7:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 14:31:33.513031 kernel: pci_bus ece7:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:31:33.513173 kernel: pci ece7:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 14:31:33.513348 kernel: pci ece7:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:31:33.513501 kernel: pci ece7:00:02.0: enabling Extended Tags Dec 13 14:31:33.513656 kernel: pci ece7:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ece7:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 14:31:33.513826 kernel: pci_bus ece7:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:31:33.513971 kernel: pci ece7:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:31:33.435159 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:31:33.455653 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:31:33.490225 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:31:33.533855 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:31:33.538708 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:31:33.547271 systemd[1]: Starting disk-uuid.service... Dec 13 14:31:33.564820 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:31:33.576812 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:31:33.682818 kernel: mlx5_core ece7:00:02.0: firmware version: 14.30.5000 Dec 13 14:31:33.942971 kernel: mlx5_core ece7:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:31:33.943164 kernel: mlx5_core ece7:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 14:31:33.943322 kernel: mlx5_core ece7:00:02.0: mlx5e_tc_post_act_init:40:(pid 189): firmware level support is missing Dec 13 14:31:33.943490 kernel: hv_netvsc 7c1e5235-f070-7c1e-5235-f0707c1e5235 eth0: VF registering: eth1 Dec 13 14:31:33.943639 kernel: mlx5_core ece7:00:02.0 eth1: joined to eth0 Dec 13 14:31:33.951819 kernel: mlx5_core ece7:00:02.0 enP60647s1: renamed from eth1 Dec 13 14:31:34.577824 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:31:34.578424 disk-uuid[552]: The operation has completed successfully. Dec 13 14:31:34.679708 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:31:34.679859 systemd[1]: Finished disk-uuid.service. Dec 13 14:31:34.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:34.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:34.686640 systemd[1]: Starting verity-setup.service... Dec 13 14:31:34.709815 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:31:34.807346 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:31:34.813528 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:31:34.819659 systemd[1]: Finished verity-setup.service. Dec 13 14:31:34.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:34.889740 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:31:34.894988 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:31:34.891681 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:31:34.927227 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:34.927257 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:31:34.927272 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:31:34.892458 systemd[1]: Starting ignition-setup.service... Dec 13 14:31:34.898603 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:31:34.955869 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:31:34.976883 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:31:34.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:34.982000 audit: BPF prog-id=9 op=LOAD Dec 13 14:31:34.983475 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:35.006347 systemd-networkd[807]: lo: Link UP Dec 13 14:31:35.006355 systemd-networkd[807]: lo: Gained carrier Dec 13 14:31:35.007241 systemd-networkd[807]: Enumeration completed Dec 13 14:31:35.009693 systemd-networkd[807]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:35.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.013249 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:35.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.018744 systemd[1]: Finished ignition-setup.service. Dec 13 14:31:35.022713 systemd[1]: Reached target network.target. Dec 13 14:31:35.028268 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:31:35.033509 systemd[1]: Starting iscsiuio.service... Dec 13 14:31:35.041835 systemd[1]: Started iscsiuio.service. Dec 13 14:31:35.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.046384 systemd[1]: Starting iscsid.service... Dec 13 14:31:35.052883 iscsid[814]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:35.052883 iscsid[814]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:31:35.052883 iscsid[814]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:31:35.052883 iscsid[814]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:31:35.052883 iscsid[814]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:35.052883 iscsid[814]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:31:35.091031 kernel: mlx5_core ece7:00:02.0 enP60647s1: Link up Dec 13 14:31:35.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.056131 systemd[1]: Started iscsid.service. Dec 13 14:31:35.077008 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:31:35.095040 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:31:35.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.099329 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:31:35.103391 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:35.107734 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:35.112261 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:31:35.121462 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:31:35.129322 kernel: hv_netvsc 7c1e5235-f070-7c1e-5235-f0707c1e5235 eth0: Data path switched to VF: enP60647s1 Dec 13 14:31:35.129508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:35.123264 systemd-networkd[807]: enP60647s1: Link UP Dec 13 14:31:35.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.123353 systemd-networkd[807]: eth0: Link UP Dec 13 14:31:35.129899 systemd-networkd[807]: eth0: Gained carrier Dec 13 14:31:35.135631 systemd-networkd[807]: enP60647s1: Gained carrier Dec 13 14:31:35.153877 systemd-networkd[807]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:31:35.818423 ignition[810]: Ignition 2.14.0 Dec 13 14:31:35.818438 ignition[810]: Stage: fetch-offline Dec 13 14:31:35.818514 ignition[810]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:35.818561 ignition[810]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:35.848844 ignition[810]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:35.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.850432 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:31:35.849091 ignition[810]: parsed url from cmdline: "" Dec 13 14:31:35.855672 systemd[1]: Starting ignition-fetch.service... Dec 13 14:31:35.849094 ignition[810]: no config URL provided Dec 13 14:31:35.849100 ignition[810]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:31:35.849112 ignition[810]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:31:35.849118 ignition[810]: failed to fetch config: resource requires networking Dec 13 14:31:35.849441 ignition[810]: Ignition finished successfully Dec 13 14:31:35.864778 ignition[833]: Ignition 2.14.0 Dec 13 14:31:35.864784 ignition[833]: Stage: fetch Dec 13 14:31:35.864955 ignition[833]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:35.864981 ignition[833]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:35.871774 ignition[833]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:35.872896 ignition[833]: parsed url from cmdline: "" Dec 13 14:31:35.872902 ignition[833]: no config URL provided Dec 13 14:31:35.872909 ignition[833]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:31:35.872918 ignition[833]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:31:35.872953 ignition[833]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:31:35.971776 ignition[833]: GET result: OK Dec 13 14:31:35.971931 ignition[833]: config has been read from IMDS userdata Dec 13 14:31:35.971972 ignition[833]: parsing config with SHA512: 194b21d2d2a6b25dd58de1d476e6b798e058383df020638b0cf36ed4203ea9ffb1c907d8f958a87f896c565c2f59524e00705b5e3633d37037861f515632964e Dec 13 14:31:35.978904 unknown[833]: fetched base config from "system" Dec 13 14:31:35.978915 unknown[833]: fetched base config from "system" Dec 13 14:31:35.978925 unknown[833]: fetched user config from "azure" Dec 13 14:31:35.984952 ignition[833]: fetch: fetch complete Dec 13 14:31:35.984962 ignition[833]: fetch: fetch passed Dec 13 14:31:35.986446 ignition[833]: Ignition finished successfully Dec 13 14:31:35.990021 systemd[1]: Finished ignition-fetch.service. Dec 13 14:31:35.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.994920 systemd[1]: Starting ignition-kargs.service... Dec 13 14:31:36.006778 ignition[839]: Ignition 2.14.0 Dec 13 14:31:36.006788 ignition[839]: Stage: kargs Dec 13 14:31:36.006929 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:36.006955 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:36.009723 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:36.012169 ignition[839]: kargs: kargs passed Dec 13 14:31:36.012214 ignition[839]: Ignition finished successfully Dec 13 14:31:36.019344 systemd[1]: Finished ignition-kargs.service. Dec 13 14:31:36.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.022095 systemd[1]: Starting ignition-disks.service... Dec 13 14:31:36.032991 ignition[845]: Ignition 2.14.0 Dec 13 14:31:36.033001 ignition[845]: Stage: disks Dec 13 14:31:36.033139 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:36.033171 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:36.037073 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:36.038919 ignition[845]: disks: disks passed Dec 13 14:31:36.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.039672 systemd[1]: Finished ignition-disks.service. Dec 13 14:31:36.038981 ignition[845]: Ignition finished successfully Dec 13 14:31:36.044005 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:31:36.047535 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:36.049516 systemd[1]: Reached target local-fs.target. Dec 13 14:31:36.051461 systemd[1]: Reached target sysinit.target. Dec 13 14:31:36.055369 systemd[1]: Reached target basic.target. Dec 13 14:31:36.057947 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:31:36.084725 systemd-fsck[853]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 14:31:36.089140 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:31:36.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.094308 systemd[1]: Mounting sysroot.mount... Dec 13 14:31:36.112813 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:31:36.113557 systemd[1]: Mounted sysroot.mount. Dec 13 14:31:36.115384 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:31:36.126292 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:31:36.133212 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:31:36.137719 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:31:36.137757 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:31:36.145368 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:31:36.161906 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:36.166563 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:31:36.177816 initrd-setup-root[868]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:31:36.191046 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (863) Dec 13 14:31:36.191082 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:36.191101 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:31:36.195625 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:31:36.195675 initrd-setup-root[876]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:31:36.202277 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:36.206968 initrd-setup-root[902]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:31:36.211356 initrd-setup-root[910]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:31:36.341235 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:31:36.349860 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:31:36.349912 kernel: audit: type=1130 audit(1734100296.345:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.346440 systemd[1]: Starting ignition-mount.service... Dec 13 14:31:36.363116 systemd[1]: Starting sysroot-boot.service... Dec 13 14:31:36.369416 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:36.369559 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:36.391269 ignition[930]: INFO : Ignition 2.14.0 Dec 13 14:31:36.391269 ignition[930]: INFO : Stage: mount Dec 13 14:31:36.395557 ignition[930]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:36.395557 ignition[930]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:36.395557 ignition[930]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:36.431591 kernel: audit: type=1130 audit(1734100296.400:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.431615 kernel: audit: type=1130 audit(1734100296.414:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.431689 ignition[930]: INFO : mount: mount passed Dec 13 14:31:36.431689 ignition[930]: INFO : Ignition finished successfully Dec 13 14:31:36.398588 systemd[1]: Finished ignition-mount.service. Dec 13 14:31:36.402125 systemd[1]: Finished sysroot-boot.service. Dec 13 14:31:36.547815 coreos-metadata[862]: Dec 13 14:31:36.547 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:31:36.554077 coreos-metadata[862]: Dec 13 14:31:36.554 INFO Fetch successful Dec 13 14:31:36.589093 coreos-metadata[862]: Dec 13 14:31:36.588 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:31:36.605915 coreos-metadata[862]: Dec 13 14:31:36.605 INFO Fetch successful Dec 13 14:31:36.613928 coreos-metadata[862]: Dec 13 14:31:36.613 INFO wrote hostname ci-3510.3.6-a-1c166c7881 to /sysroot/etc/hostname Dec 13 14:31:36.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.615651 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:31:36.632989 kernel: audit: type=1130 audit(1734100296.619:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.620852 systemd[1]: Starting ignition-files.service... Dec 13 14:31:36.640020 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:36.651814 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (941) Dec 13 14:31:36.660020 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:36.660044 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:31:36.660058 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:31:36.669850 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:36.683124 ignition[960]: INFO : Ignition 2.14.0 Dec 13 14:31:36.683124 ignition[960]: INFO : Stage: files Dec 13 14:31:36.686598 ignition[960]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:36.686598 ignition[960]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:36.699816 ignition[960]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:36.707884 ignition[960]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:31:36.711883 ignition[960]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:31:36.711883 ignition[960]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:31:36.725050 ignition[960]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:31:36.728609 ignition[960]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:31:36.731855 ignition[960]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:31:36.730170 unknown[960]: wrote ssh authorized keys file for user: core Dec 13 14:31:36.737868 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:31:36.737868 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:31:36.938915 systemd-networkd[807]: eth0: Gained IPv6LL Dec 13 14:31:36.960424 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:31:37.078176 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:31:37.083293 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:37.154254 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (965) Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3588418803" Dec 13 14:31:37.154277 ignition[960]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3588418803": device or resource busy Dec 13 14:31:37.154277 ignition[960]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3588418803", trying btrfs: device or resource busy Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3588418803" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3588418803" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3588418803" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3588418803" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2300856200" Dec 13 14:31:37.154277 ignition[960]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2300856200": device or resource busy Dec 13 14:31:37.154277 ignition[960]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2300856200", trying btrfs: device or resource busy Dec 13 14:31:37.154277 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2300856200" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2300856200" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2300856200" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2300856200" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:37.223401 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:31:37.646412 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 14:31:38.066624 ignition[960]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:31:38.066624 ignition[960]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 14:31:38.066624 ignition[960]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 14:31:38.066624 ignition[960]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 14:31:38.066624 ignition[960]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 14:31:38.066624 ignition[960]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 14:31:38.105877 kernel: audit: type=1130 audit(1734100298.076:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.072991 systemd[1]: Finished ignition-files.service. Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:31:38.109683 ignition[960]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:31:38.109683 ignition[960]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:31:38.109683 ignition[960]: INFO : files: files passed Dec 13 14:31:38.109683 ignition[960]: INFO : Ignition finished successfully Dec 13 14:31:38.172641 kernel: audit: type=1130 audit(1734100298.108:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.172674 kernel: audit: type=1131 audit(1734100298.108:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.090713 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:31:38.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.098663 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:31:38.196389 kernel: audit: type=1130 audit(1734100298.176:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.196418 initrd-setup-root-after-ignition[985]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:31:38.101982 systemd[1]: Starting ignition-quench.service... Dec 13 14:31:38.105458 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:31:38.105563 systemd[1]: Finished ignition-quench.service. Dec 13 14:31:38.172732 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:31:38.177560 systemd[1]: Reached target ignition-complete.target. Dec 13 14:31:38.210654 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:31:38.224575 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:31:38.225222 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:31:38.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.231041 systemd[1]: Reached target initrd-fs.target. Dec 13 14:31:38.257501 kernel: audit: type=1130 audit(1734100298.230:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.257532 kernel: audit: type=1131 audit(1734100298.230:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.254086 systemd[1]: Reached target initrd.target. Dec 13 14:31:38.257516 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:31:38.259394 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:31:38.273571 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:31:38.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.276358 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:31:38.286982 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:31:38.291019 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:31:38.295228 systemd[1]: Stopped target timers.target. Dec 13 14:31:38.298870 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:31:38.301113 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:31:38.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.305147 systemd[1]: Stopped target initrd.target. Dec 13 14:31:38.308730 systemd[1]: Stopped target basic.target. Dec 13 14:31:38.312200 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:31:38.316607 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:31:38.320807 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:31:38.325188 systemd[1]: Stopped target remote-fs.target. Dec 13 14:31:38.328907 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:31:38.333090 systemd[1]: Stopped target sysinit.target. Dec 13 14:31:38.336876 systemd[1]: Stopped target local-fs.target. Dec 13 14:31:38.340492 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:31:38.344246 systemd[1]: Stopped target swap.target. Dec 13 14:31:38.347692 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:31:38.350033 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:31:38.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.353874 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:31:38.357596 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:31:38.359886 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:31:38.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.363931 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:31:38.366611 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:31:38.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.371187 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:31:38.373303 systemd[1]: Stopped ignition-files.service. Dec 13 14:31:38.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.376920 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:31:38.379539 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:31:38.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.389854 iscsid[814]: iscsid shutting down. Dec 13 14:31:38.384682 systemd[1]: Stopping ignition-mount.service... Dec 13 14:31:38.386639 systemd[1]: Stopping iscsid.service... Dec 13 14:31:38.396211 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:31:38.398053 ignition[998]: INFO : Ignition 2.14.0 Dec 13 14:31:38.398053 ignition[998]: INFO : Stage: umount Dec 13 14:31:38.398053 ignition[998]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:38.398053 ignition[998]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:31:38.410597 ignition[998]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:31:38.410597 ignition[998]: INFO : umount: umount passed Dec 13 14:31:38.410597 ignition[998]: INFO : Ignition finished successfully Dec 13 14:31:38.419146 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:31:38.421629 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:31:38.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.426839 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:31:38.430223 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:31:38.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.437029 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:31:38.439876 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:31:38.442176 systemd[1]: Stopped iscsid.service. Dec 13 14:31:38.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.446177 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:31:38.448503 systemd[1]: Stopped ignition-mount.service. Dec 13 14:31:38.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.452652 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:31:38.452772 systemd[1]: Stopped ignition-disks.service. Dec 13 14:31:38.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.458856 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:31:38.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.458912 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:31:38.462838 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:31:38.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.462890 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:31:38.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.468844 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:31:38.468893 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:31:38.472792 systemd[1]: Stopped target paths.target. Dec 13 14:31:38.477090 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:31:38.480661 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:31:38.487401 systemd[1]: Stopped target slices.target. Dec 13 14:31:38.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.489473 systemd[1]: Stopped target sockets.target. Dec 13 14:31:38.490335 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:31:38.490377 systemd[1]: Closed iscsid.socket. Dec 13 14:31:38.490779 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:31:38.490824 systemd[1]: Stopped ignition-setup.service. Dec 13 14:31:38.491252 systemd[1]: Stopping iscsiuio.service... Dec 13 14:31:38.491844 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:31:38.491937 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:31:38.516089 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:31:38.516195 systemd[1]: Stopped iscsiuio.service. Dec 13 14:31:38.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.522120 systemd[1]: Stopped target network.target. Dec 13 14:31:38.524101 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:31:38.524135 systemd[1]: Closed iscsiuio.socket. Dec 13 14:31:38.531077 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:31:38.534768 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:31:38.538887 systemd-networkd[807]: eth0: DHCPv6 lease lost Dec 13 14:31:38.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.540010 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:31:38.540117 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:31:38.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.545974 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:31:38.546054 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:31:38.548534 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:31:38.548566 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:31:38.553571 systemd[1]: Stopping network-cleanup.service... Dec 13 14:31:38.562000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:31:38.562000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:31:38.561044 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:31:38.561109 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:31:38.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.571426 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:31:38.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.571482 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:31:38.575599 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:31:38.577419 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:31:38.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.583763 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:31:38.588454 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:31:38.595122 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:31:38.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.595284 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:31:38.599737 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:31:38.599776 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:31:38.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.603496 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:31:38.603535 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:31:38.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.607870 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:31:38.607923 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:31:38.641652 kernel: hv_netvsc 7c1e5235-f070-7c1e-5235-f0707c1e5235 eth0: Data path switched from VF: enP60647s1 Dec 13 14:31:38.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.611564 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:31:38.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.611612 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:31:38.617981 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:31:38.618022 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:31:38.622433 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:31:38.626107 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:31:38.626175 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:31:38.628622 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:31:38.628672 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:31:38.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.637713 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:31:38.637761 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:31:38.642977 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:31:38.643420 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:31:38.643502 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:31:38.662879 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:31:38.662973 systemd[1]: Stopped network-cleanup.service. Dec 13 14:31:38.957900 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:31:38.958034 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:31:38.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.964536 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:31:38.968509 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:31:38.968575 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:31:38.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:38.975378 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:31:38.986279 systemd[1]: Switching root. Dec 13 14:31:39.011504 systemd-journald[183]: Journal stopped Dec 13 14:31:43.405878 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 14:31:43.405907 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:31:43.405919 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:31:43.405929 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:31:43.405937 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:31:43.405947 kernel: SELinux: policy capability open_perms=1 Dec 13 14:31:43.405958 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:31:43.405969 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:31:43.405977 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:31:43.405987 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:31:43.405995 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:31:43.406003 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:31:43.406014 systemd[1]: Successfully loaded SELinux policy in 138.302ms. Dec 13 14:31:43.406025 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.647ms. Dec 13 14:31:43.406040 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:31:43.406051 systemd[1]: Detected virtualization microsoft. Dec 13 14:31:43.406061 systemd[1]: Detected architecture x86-64. Dec 13 14:31:43.406070 systemd[1]: Detected first boot. Dec 13 14:31:43.406083 systemd[1]: Hostname set to . Dec 13 14:31:43.406094 systemd[1]: Initializing machine ID from random generator. Dec 13 14:31:43.406103 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:31:43.406113 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:31:43.406124 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:43.406135 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:43.406147 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:43.406160 kernel: kauditd_printk_skb: 55 callbacks suppressed Dec 13 14:31:43.406169 kernel: audit: type=1334 audit(1734100302.943:92): prog-id=12 op=LOAD Dec 13 14:31:43.406182 kernel: audit: type=1334 audit(1734100302.943:93): prog-id=3 op=UNLOAD Dec 13 14:31:43.406190 kernel: audit: type=1334 audit(1734100302.948:94): prog-id=13 op=LOAD Dec 13 14:31:43.406200 kernel: audit: type=1334 audit(1734100302.953:95): prog-id=14 op=LOAD Dec 13 14:31:43.406210 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:31:43.406219 kernel: audit: type=1334 audit(1734100302.953:96): prog-id=4 op=UNLOAD Dec 13 14:31:43.406230 kernel: audit: type=1334 audit(1734100302.953:97): prog-id=5 op=UNLOAD Dec 13 14:31:43.406243 kernel: audit: type=1131 audit(1734100302.954:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.406254 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:31:43.406266 kernel: audit: type=1334 audit(1734100302.996:99): prog-id=12 op=UNLOAD Dec 13 14:31:43.406276 kernel: audit: type=1130 audit(1734100303.004:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.406286 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:31:43.406298 kernel: audit: type=1131 audit(1734100303.004:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.406311 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:31:43.406322 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:31:43.406336 systemd[1]: Created slice system-getty.slice. Dec 13 14:31:43.406346 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:31:43.406358 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:31:43.406368 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:31:43.406380 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:31:43.406389 systemd[1]: Created slice user.slice. Dec 13 14:31:43.406402 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:31:43.406414 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:31:43.406426 systemd[1]: Set up automount boot.automount. Dec 13 14:31:43.406435 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:31:43.406447 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:31:43.406456 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:31:43.406469 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:31:43.406479 systemd[1]: Reached target integritysetup.target. Dec 13 14:31:43.406491 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:43.406502 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:43.406514 systemd[1]: Reached target slices.target. Dec 13 14:31:43.406523 systemd[1]: Reached target swap.target. Dec 13 14:31:43.406535 systemd[1]: Reached target torcx.target. Dec 13 14:31:43.406545 systemd[1]: Reached target veritysetup.target. Dec 13 14:31:43.406556 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:31:43.406566 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:31:43.406578 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:31:43.406593 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:31:43.406606 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:31:43.406618 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:31:43.406633 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:31:43.406645 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:31:43.406659 systemd[1]: Mounting media.mount... Dec 13 14:31:43.406671 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:43.406681 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:31:43.406690 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:31:43.406700 systemd[1]: Mounting tmp.mount... Dec 13 14:31:43.406709 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:31:43.406719 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:43.406728 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:31:43.406738 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:31:43.406750 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:43.406761 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:43.406773 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:43.406783 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:31:43.406804 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:43.406818 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:31:43.406838 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:31:43.406852 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:31:43.406865 kernel: loop: module loaded Dec 13 14:31:43.406878 kernel: fuse: init (API version 7.34) Dec 13 14:31:43.406889 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:31:43.406902 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:31:43.406916 systemd[1]: Stopped systemd-journald.service. Dec 13 14:31:43.406930 systemd[1]: Starting systemd-journald.service... Dec 13 14:31:43.406946 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:31:43.406961 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:31:43.406976 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:31:43.406991 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:31:43.407009 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:31:43.407024 systemd[1]: Stopped verity-setup.service. Dec 13 14:31:43.407038 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:43.407055 systemd-journald[1142]: Journal started Dec 13 14:31:43.407104 systemd-journald[1142]: Runtime Journal (/run/log/journal/34db981fb5ad4b9bafdfa290e1da9338) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:31:39.623000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:31:39.837000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:31:39.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:31:39.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:31:39.842000 audit: BPF prog-id=10 op=LOAD Dec 13 14:31:39.843000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:31:39.843000 audit: BPF prog-id=11 op=LOAD Dec 13 14:31:39.843000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:31:40.191000 audit[1032]: AVC avc: denied { associate } for pid=1032 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:31:40.191000 audit[1032]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.191000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:31:40.199000 audit[1032]: AVC avc: denied { associate } for pid=1032 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:31:40.199000 audit[1032]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.199000 audit: CWD cwd="/" Dec 13 14:31:40.199000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:40.199000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:40.199000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:31:42.943000 audit: BPF prog-id=12 op=LOAD Dec 13 14:31:42.943000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:31:42.948000 audit: BPF prog-id=13 op=LOAD Dec 13 14:31:42.953000 audit: BPF prog-id=14 op=LOAD Dec 13 14:31:42.953000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:31:42.953000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:31:42.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:42.996000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:31:43.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.352000 audit: BPF prog-id=15 op=LOAD Dec 13 14:31:43.352000 audit: BPF prog-id=16 op=LOAD Dec 13 14:31:43.352000 audit: BPF prog-id=17 op=LOAD Dec 13 14:31:43.352000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:31:43.352000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:31:43.402000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:31:43.402000 audit[1142]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe0d070350 a2=4000 a3=7ffe0d0703ec items=0 ppid=1 pid=1142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.402000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:31:43.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:40.181396 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:42.942655 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:31:40.182359 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:31:42.954935 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:31:40.182413 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:31:40.182488 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:31:40.182517 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:31:40.182613 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:31:40.182657 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:31:40.182851 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:31:40.182897 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:31:40.182910 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:31:40.187506 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:31:40.187538 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:31:40.187555 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:31:40.187569 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:31:40.187584 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:31:40.187596 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:31:42.463745 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:42.464010 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:42.464115 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:42.464280 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:42.464325 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:31:42.464376 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:31:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:31:43.421120 systemd[1]: Started systemd-journald.service. Dec 13 14:31:43.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.422167 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:31:43.424188 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:31:43.426486 systemd[1]: Mounted media.mount. Dec 13 14:31:43.428601 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:31:43.430937 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:31:43.432972 systemd[1]: Mounted tmp.mount. Dec 13 14:31:43.434891 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:31:43.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.437120 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:31:43.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.439322 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:31:43.439542 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:31:43.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.442145 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:43.442531 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:43.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.445010 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:43.445290 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:43.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.447447 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:43.447960 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:43.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.450250 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:31:43.450428 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:31:43.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.452811 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:43.453097 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:43.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.455610 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:31:43.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.458214 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:31:43.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.460737 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:31:43.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.463640 systemd[1]: Reached target network-pre.target. Dec 13 14:31:43.467306 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:31:43.475525 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:31:43.477498 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:31:43.514848 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:31:43.518591 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:31:43.521771 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:43.523224 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:31:43.527023 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:43.528644 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:31:43.531574 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:31:43.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.537427 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:31:43.551311 systemd-journald[1142]: Time spent on flushing to /var/log/journal/34db981fb5ad4b9bafdfa290e1da9338 is 29.153ms for 1139 entries. Dec 13 14:31:43.551311 systemd-journald[1142]: System Journal (/var/log/journal/34db981fb5ad4b9bafdfa290e1da9338) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:31:43.609195 systemd-journald[1142]: Received client request to flush runtime journal. Dec 13 14:31:43.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.540672 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:31:43.611721 udevadm[1156]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:31:43.543320 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:31:43.547023 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:31:43.562154 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:31:43.565027 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:31:43.573462 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:31:43.610246 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:31:43.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.684537 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:31:43.689186 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:31:43.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.788007 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:31:44.127846 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:31:44.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:44.130000 audit: BPF prog-id=18 op=LOAD Dec 13 14:31:44.130000 audit: BPF prog-id=19 op=LOAD Dec 13 14:31:44.130000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:31:44.130000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:31:44.132181 systemd[1]: Starting systemd-udevd.service... Dec 13 14:31:44.149785 systemd-udevd[1161]: Using default interface naming scheme 'v252'. Dec 13 14:31:44.215313 systemd[1]: Started systemd-udevd.service. Dec 13 14:31:44.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:44.220000 audit: BPF prog-id=20 op=LOAD Dec 13 14:31:44.222144 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:44.258000 audit: BPF prog-id=21 op=LOAD Dec 13 14:31:44.258000 audit: BPF prog-id=22 op=LOAD Dec 13 14:31:44.258000 audit: BPF prog-id=23 op=LOAD Dec 13 14:31:44.260448 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:31:44.264483 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:31:44.306059 systemd[1]: Started systemd-userdbd.service. Dec 13 14:31:44.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:44.355815 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:31:44.386819 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:31:44.379000 audit[1178]: AVC avc: denied { confidentiality } for pid=1178 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:31:44.406175 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:31:44.406254 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:31:44.406275 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:31:44.406293 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:31:44.413014 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:31:44.419892 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:31:44.428056 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:31:44.428137 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:31:44.442177 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:31:44.442286 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:31:44.442314 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:31:44.379000 audit[1178]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55668f858350 a1=f884 a2=7f04ba10fbc5 a3=5 items=12 ppid=1161 pid=1178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.379000 audit: CWD cwd="/" Dec 13 14:31:44.379000 audit: PATH item=0 name=(null) inode=237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=1 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=2 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=3 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=4 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=5 name=(null) inode=14107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=6 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=7 name=(null) inode=14108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=8 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=9 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=10 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PATH item=11 name=(null) inode=14110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:44.379000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:31:44.970891 systemd-networkd[1175]: lo: Link UP Dec 13 14:31:44.970904 systemd-networkd[1175]: lo: Gained carrier Dec 13 14:31:44.971571 systemd-networkd[1175]: Enumeration completed Dec 13 14:31:44.971696 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:44.975616 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:31:44.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:44.983076 systemd-networkd[1175]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:45.036848 kernel: mlx5_core ece7:00:02.0 enP60647s1: Link up Dec 13 14:31:45.059315 kernel: hv_netvsc 7c1e5235-f070-7c1e-5235-f0707c1e5235 eth0: Data path switched to VF: enP60647s1 Dec 13 14:31:45.059498 systemd-networkd[1175]: enP60647s1: Link UP Dec 13 14:31:45.060156 systemd-networkd[1175]: eth0: Link UP Dec 13 14:31:45.060169 systemd-networkd[1175]: eth0: Gained carrier Dec 13 14:31:45.065098 systemd-networkd[1175]: enP60647s1: Gained carrier Dec 13 14:31:45.077866 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1176) Dec 13 14:31:45.080950 systemd-networkd[1175]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:31:45.162593 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:31:45.201816 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 14:31:45.242680 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:31:45.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.246812 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:31:45.324910 lvm[1236]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:45.354013 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:31:45.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.357177 systemd[1]: Reached target cryptsetup.target. Dec 13 14:31:45.361107 systemd[1]: Starting lvm2-activation.service... Dec 13 14:31:45.366186 lvm[1237]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:45.387873 systemd[1]: Finished lvm2-activation.service. Dec 13 14:31:45.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.390441 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:45.392781 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:31:45.392880 systemd[1]: Reached target local-fs.target. Dec 13 14:31:45.394918 systemd[1]: Reached target machines.target. Dec 13 14:31:45.398035 systemd[1]: Starting ldconfig.service... Dec 13 14:31:45.400121 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:45.400221 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:45.401374 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:31:45.404592 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:31:45.409076 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:31:45.414014 systemd[1]: Starting systemd-sysext.service... Dec 13 14:31:45.419156 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1239 (bootctl) Dec 13 14:31:45.421838 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:31:45.441555 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:31:45.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.685607 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:31:45.876766 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:45.877000 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:31:45.953821 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:31:46.019067 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:31:46.020745 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:31:46.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.068839 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:31:46.088819 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:31:46.098582 (sd-sysext)[1251]: Using extensions 'kubernetes'. Dec 13 14:31:46.099433 (sd-sysext)[1251]: Merged extensions into '/usr'. Dec 13 14:31:46.101433 systemd-fsck[1247]: fsck.fat 4.2 (2021-01-31) Dec 13 14:31:46.101433 systemd-fsck[1247]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:31:46.103771 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:31:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.108734 systemd[1]: Mounting boot.mount... Dec 13 14:31:46.128894 systemd[1]: Mounted boot.mount. Dec 13 14:31:46.135213 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:46.141666 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:31:46.143850 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.145430 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:46.148837 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:46.151914 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:46.153928 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.154128 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:46.154298 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:46.157658 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:31:46.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.160289 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:31:46.162621 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:46.162765 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:46.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.165788 systemd[1]: Finished systemd-sysext.service. Dec 13 14:31:46.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.168351 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:46.168490 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:46.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.170991 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:46.171132 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:46.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.178438 systemd[1]: Starting ensure-sysext.service... Dec 13 14:31:46.182012 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:46.182095 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.183317 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:31:46.188788 systemd[1]: Reloading. Dec 13 14:31:46.202334 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:31:46.207857 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:31:46.214434 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:31:46.258122 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2024-12-13T14:31:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:46.262810 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2024-12-13T14:31:46Z" level=info msg="torcx already run" Dec 13 14:31:46.369817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:46.369838 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:46.388552 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:46.456000 audit: BPF prog-id=24 op=LOAD Dec 13 14:31:46.457000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:31:46.458000 audit: BPF prog-id=25 op=LOAD Dec 13 14:31:46.458000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:31:46.458000 audit: BPF prog-id=26 op=LOAD Dec 13 14:31:46.458000 audit: BPF prog-id=27 op=LOAD Dec 13 14:31:46.458000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:31:46.458000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:31:46.458000 audit: BPF prog-id=28 op=LOAD Dec 13 14:31:46.458000 audit: BPF prog-id=29 op=LOAD Dec 13 14:31:46.459000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:31:46.459000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:31:46.459000 audit: BPF prog-id=30 op=LOAD Dec 13 14:31:46.459000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:31:46.459000 audit: BPF prog-id=31 op=LOAD Dec 13 14:31:46.459000 audit: BPF prog-id=32 op=LOAD Dec 13 14:31:46.459000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:31:46.459000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:31:46.474213 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.475548 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:46.479474 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:46.483518 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:46.485514 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.485749 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:46.487292 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:46.487447 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:46.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.490392 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:46.490554 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:46.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.493733 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:46.494920 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:46.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.499785 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.501582 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:46.505109 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:46.510478 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:46.512966 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.513174 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:46.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.515117 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:46.515295 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:46.518115 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:46.518276 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:46.520965 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:46.521123 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:46.523957 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:46.524087 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.529363 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.531684 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:46.535265 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:46.539206 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:46.542883 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:46.544750 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.545098 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:46.546425 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:46.546616 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:46.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.549369 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:46.549528 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:46.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.551986 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:46.552153 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:46.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.555139 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:46.555424 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:46.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.558564 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:46.558716 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:46.560335 systemd[1]: Finished ensure-sysext.service. Dec 13 14:31:46.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.601808 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:31:46.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.606563 systemd[1]: Starting audit-rules.service... Dec 13 14:31:46.614148 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:31:46.617635 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:31:46.620000 audit: BPF prog-id=33 op=LOAD Dec 13 14:31:46.623861 systemd[1]: Starting systemd-resolved.service... Dec 13 14:31:46.627000 audit: BPF prog-id=34 op=LOAD Dec 13 14:31:46.629705 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:31:46.632951 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:31:46.651272 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:31:46.653923 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:31:46.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.659000 audit[1363]: SYSTEM_BOOT pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.663154 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:31:46.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.698950 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:31:46.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.745000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:31:46.745000 audit[1375]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1cee7a30 a2=420 a3=0 items=0 ppid=1355 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.745000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:31:46.746578 augenrules[1375]: No rules Dec 13 14:31:46.746587 systemd[1]: Finished audit-rules.service. Dec 13 14:31:46.751131 systemd-resolved[1359]: Positive Trust Anchors: Dec 13 14:31:46.751153 systemd-resolved[1359]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:31:46.751197 systemd-resolved[1359]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:31:46.753970 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:31:46.756058 systemd[1]: Reached target time-set.target. Dec 13 14:31:46.785731 systemd-resolved[1359]: Using system hostname 'ci-3510.3.6-a-1c166c7881'. Dec 13 14:31:46.787239 systemd[1]: Started systemd-resolved.service. Dec 13 14:31:46.789632 systemd[1]: Reached target network.target. Dec 13 14:31:46.791588 systemd[1]: Reached target nss-lookup.target. Dec 13 14:31:46.861925 systemd-networkd[1175]: eth0: Gained IPv6LL Dec 13 14:31:46.864125 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:31:46.867272 systemd[1]: Reached target network-online.target. Dec 13 14:31:46.877055 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:46.877079 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:46.913516 systemd-timesyncd[1362]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). Dec 13 14:31:46.913648 systemd-timesyncd[1362]: Initial clock synchronization to Fri 2024-12-13 14:31:46.912731 UTC. Dec 13 14:31:48.774830 ldconfig[1238]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:31:48.832182 systemd[1]: Finished ldconfig.service. Dec 13 14:31:48.837117 systemd[1]: Starting systemd-update-done.service... Dec 13 14:31:48.847116 systemd[1]: Finished systemd-update-done.service. Dec 13 14:31:48.849972 systemd[1]: Reached target sysinit.target. Dec 13 14:31:48.852328 systemd[1]: Started motdgen.path. Dec 13 14:31:48.854005 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:31:48.856967 systemd[1]: Started logrotate.timer. Dec 13 14:31:48.858826 systemd[1]: Started mdadm.timer. Dec 13 14:31:48.860563 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:31:48.862753 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:31:48.862783 systemd[1]: Reached target paths.target. Dec 13 14:31:48.864556 systemd[1]: Reached target timers.target. Dec 13 14:31:48.867842 systemd[1]: Listening on dbus.socket. Dec 13 14:31:48.871156 systemd[1]: Starting docker.socket... Dec 13 14:31:48.881973 systemd[1]: Listening on sshd.socket. Dec 13 14:31:48.884211 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:48.884646 systemd[1]: Listening on docker.socket. Dec 13 14:31:48.886725 systemd[1]: Reached target sockets.target. Dec 13 14:31:48.888773 systemd[1]: Reached target basic.target. Dec 13 14:31:48.891235 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:48.891275 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:48.892300 systemd[1]: Starting containerd.service... Dec 13 14:31:48.895339 systemd[1]: Starting dbus.service... Dec 13 14:31:48.897825 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:31:48.900922 systemd[1]: Starting extend-filesystems.service... Dec 13 14:31:48.903005 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:31:48.904472 systemd[1]: Starting kubelet.service... Dec 13 14:31:48.908223 systemd[1]: Starting motdgen.service... Dec 13 14:31:48.911242 systemd[1]: Started nvidia.service. Dec 13 14:31:48.914590 systemd[1]: Starting prepare-helm.service... Dec 13 14:31:48.918268 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:31:48.922950 systemd[1]: Starting sshd-keygen.service... Dec 13 14:31:48.928346 systemd[1]: Starting systemd-logind.service... Dec 13 14:31:48.929539 jq[1386]: false Dec 13 14:31:48.930832 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:48.930964 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:31:48.934025 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:31:48.934848 systemd[1]: Starting update-engine.service... Dec 13 14:31:48.938118 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:31:48.943870 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:31:48.944109 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:31:48.948656 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:31:48.948933 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:31:48.957870 jq[1401]: true Dec 13 14:31:48.987930 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:31:48.988182 systemd[1]: Finished motdgen.service. Dec 13 14:31:49.025557 jq[1407]: true Dec 13 14:31:49.099157 env[1409]: time="2024-12-13T14:31:49.099114402Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:31:49.126197 extend-filesystems[1387]: Found loop1 Dec 13 14:31:49.128899 extend-filesystems[1387]: Found sda Dec 13 14:31:49.131190 extend-filesystems[1387]: Found sda1 Dec 13 14:31:49.133297 extend-filesystems[1387]: Found sda2 Dec 13 14:31:49.135355 extend-filesystems[1387]: Found sda3 Dec 13 14:31:49.137715 extend-filesystems[1387]: Found usr Dec 13 14:31:49.137715 extend-filesystems[1387]: Found sda4 Dec 13 14:31:49.137715 extend-filesystems[1387]: Found sda6 Dec 13 14:31:49.137715 extend-filesystems[1387]: Found sda7 Dec 13 14:31:49.137715 extend-filesystems[1387]: Found sda9 Dec 13 14:31:49.137715 extend-filesystems[1387]: Checking size of /dev/sda9 Dec 13 14:31:49.160311 env[1409]: time="2024-12-13T14:31:49.158890038Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:31:49.160311 env[1409]: time="2024-12-13T14:31:49.159046132Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.160651874Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.160690073Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.160964263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.160987162Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161005461Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161021561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161106258Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161346549Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161515943Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:49.161819 env[1409]: time="2024-12-13T14:31:49.161536342Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:31:49.162173 env[1409]: time="2024-12-13T14:31:49.161590740Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:31:49.162173 env[1409]: time="2024-12-13T14:31:49.161605140Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:31:49.368946 systemd-logind[1399]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:31:49.369677 systemd-logind[1399]: New seat seat0. Dec 13 14:31:49.540824 tar[1404]: linux-amd64/helm Dec 13 14:31:49.582913 extend-filesystems[1387]: Old size kept for /dev/sda9 Dec 13 14:31:49.585489 extend-filesystems[1387]: Found sr0 Dec 13 14:31:49.583465 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:31:49.583635 systemd[1]: Finished extend-filesystems.service. Dec 13 14:31:49.719180 env[1409]: time="2024-12-13T14:31:49.719075159Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:31:49.719180 env[1409]: time="2024-12-13T14:31:49.719135057Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:31:49.719180 env[1409]: time="2024-12-13T14:31:49.719152556Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719193855Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719212254Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719228353Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719245753Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719261552Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719277451Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719309250Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719328050Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.719388 env[1409]: time="2024-12-13T14:31:49.719348449Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:31:49.719689 env[1409]: time="2024-12-13T14:31:49.719497844Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:31:49.719689 env[1409]: time="2024-12-13T14:31:49.719598140Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:31:49.727134 env[1409]: time="2024-12-13T14:31:49.727098568Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:31:49.727238 env[1409]: time="2024-12-13T14:31:49.727160866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727238 env[1409]: time="2024-12-13T14:31:49.727179065Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:31:49.727331 env[1409]: time="2024-12-13T14:31:49.727259563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727331 env[1409]: time="2024-12-13T14:31:49.727280262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727408 env[1409]: time="2024-12-13T14:31:49.727360159Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727408 env[1409]: time="2024-12-13T14:31:49.727394058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727481 env[1409]: time="2024-12-13T14:31:49.727412957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727481 env[1409]: time="2024-12-13T14:31:49.727430856Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727481 env[1409]: time="2024-12-13T14:31:49.727447556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727579 env[1409]: time="2024-12-13T14:31:49.727476655Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727579 env[1409]: time="2024-12-13T14:31:49.727498154Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:31:49.727723 env[1409]: time="2024-12-13T14:31:49.727687847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727777 env[1409]: time="2024-12-13T14:31:49.727738745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727777 env[1409]: time="2024-12-13T14:31:49.727761744Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.727885 env[1409]: time="2024-12-13T14:31:49.727832342Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:31:49.727927 env[1409]: time="2024-12-13T14:31:49.727875740Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:31:49.727927 env[1409]: time="2024-12-13T14:31:49.727896539Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:31:49.727998 env[1409]: time="2024-12-13T14:31:49.727921639Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:31:49.727998 env[1409]: time="2024-12-13T14:31:49.727976037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:31:49.728361 env[1409]: time="2024-12-13T14:31:49.728280326Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:31:49.733806 systemd[1]: Started containerd.service. Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.728374922Z" level=info msg="Connect containerd service" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.728433220Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729405385Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729541880Z" level=info msg="Start subscribing containerd event" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729589878Z" level=info msg="Start recovering state" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729658976Z" level=info msg="Start event monitor" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729674975Z" level=info msg="Start snapshots syncer" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729686275Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.729697274Z" level=info msg="Start streaming server" Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.733582834Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.733663431Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:31:49.973707 env[1409]: time="2024-12-13T14:31:49.735089479Z" level=info msg="containerd successfully booted in 0.636755s" Dec 13 14:31:49.974183 sshd_keygen[1408]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:31:49.866979 systemd[1]: Finished sshd-keygen.service. Dec 13 14:31:49.870711 systemd[1]: Starting issuegen.service... Dec 13 14:31:49.874018 systemd[1]: Started waagent.service. Dec 13 14:31:49.881411 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:31:49.881569 systemd[1]: Finished issuegen.service. Dec 13 14:31:49.884759 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:31:50.014665 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:31:50.030207 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:31:50.036149 systemd[1]: Started getty@tty1.service. Dec 13 14:31:50.040031 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:31:50.042928 systemd[1]: Reached target getty.target. Dec 13 14:31:50.179589 dbus-daemon[1385]: [system] SELinux support is enabled Dec 13 14:31:50.184410 bash[1429]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:31:50.181781 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:31:50.184902 systemd[1]: Started dbus.service. Dec 13 14:31:50.189992 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:31:50.190025 systemd[1]: Reached target system-config.target. Dec 13 14:31:50.192654 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:31:50.192686 systemd[1]: Reached target user-config.target. Dec 13 14:31:50.199264 systemd[1]: Started systemd-logind.service. Dec 13 14:31:50.201663 dbus-daemon[1385]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:31:50.356846 systemd[1]: Started kubelet.service. Dec 13 14:31:50.454721 tar[1404]: linux-amd64/LICENSE Dec 13 14:31:50.454721 tar[1404]: linux-amd64/README.md Dec 13 14:31:50.459986 systemd[1]: Finished prepare-helm.service. Dec 13 14:31:50.776149 update_engine[1400]: I1213 14:31:50.775166 1400 main.cc:92] Flatcar Update Engine starting Dec 13 14:31:50.877673 systemd[1]: Started update-engine.service. Dec 13 14:31:50.884938 update_engine[1400]: I1213 14:31:50.884666 1400 update_check_scheduler.cc:74] Next update check in 10m0s Dec 13 14:31:50.883085 systemd[1]: Started locksmithd.service. Dec 13 14:31:50.886596 systemd[1]: Reached target multi-user.target. Dec 13 14:31:50.891189 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:31:50.903291 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:31:50.903487 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:31:50.906056 systemd[1]: Startup finished in 600ms (firmware) + 7.880s (loader) + 948ms (kernel) + 7.707s (initrd) + 10.966s (userspace) = 28.102s. Dec 13 14:31:51.068340 kubelet[1505]: E1213 14:31:51.068266 1505 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:51.070330 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:51.070496 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:51.070786 systemd[1]: kubelet.service: Consumed 1.035s CPU time. Dec 13 14:31:51.685908 login[1501]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:31:51.687879 login[1502]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:31:51.738477 systemd[1]: Created slice user-500.slice. Dec 13 14:31:51.739994 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:31:51.743098 systemd-logind[1399]: New session 2 of user core. Dec 13 14:31:51.746218 systemd-logind[1399]: New session 1 of user core. Dec 13 14:31:51.786301 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:31:51.788115 systemd[1]: Starting user@500.service... Dec 13 14:31:51.822141 (systemd)[1518]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:52.128002 systemd[1518]: Queued start job for default target default.target. Dec 13 14:31:52.128748 systemd[1518]: Reached target paths.target. Dec 13 14:31:52.128779 systemd[1518]: Reached target sockets.target. Dec 13 14:31:52.128825 systemd[1518]: Reached target timers.target. Dec 13 14:31:52.128847 systemd[1518]: Reached target basic.target. Dec 13 14:31:52.128915 systemd[1518]: Reached target default.target. Dec 13 14:31:52.128960 systemd[1518]: Startup finished in 299ms. Dec 13 14:31:52.129303 systemd[1]: Started user@500.service. Dec 13 14:31:52.130783 systemd[1]: Started session-1.scope. Dec 13 14:31:52.131408 systemd[1]: Started session-2.scope. Dec 13 14:31:52.680814 locksmithd[1512]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:31:54.190759 waagent[1493]: 2024-12-13T14:31:54.190641Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:31:54.203858 waagent[1493]: 2024-12-13T14:31:54.192878Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:31:54.203858 waagent[1493]: 2024-12-13T14:31:54.193747Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:31:54.203858 waagent[1493]: 2024-12-13T14:31:54.194985Z INFO Daemon Daemon Run daemon Dec 13 14:31:54.203858 waagent[1493]: 2024-12-13T14:31:54.196008Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:31:54.209165 waagent[1493]: 2024-12-13T14:31:54.209035Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:31:54.215650 waagent[1493]: 2024-12-13T14:31:54.215551Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.216776Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.217510Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.219022Z INFO Daemon Daemon Activate resource disk Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.219747Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.227638Z INFO Daemon Daemon Found device: None Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.228454Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.229260Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.230941Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:31:54.245759 waagent[1493]: 2024-12-13T14:31:54.231827Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:31:54.247021 waagent[1493]: 2024-12-13T14:31:54.246900Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:31:54.254758 waagent[1493]: 2024-12-13T14:31:54.254652Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:31:54.259610 waagent[1493]: 2024-12-13T14:31:54.259545Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:31:54.262023 waagent[1493]: 2024-12-13T14:31:54.261961Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:31:55.292449 waagent[1493]: 2024-12-13T14:31:55.290964Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:31:56.437740 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:31:56.532440 waagent[1493]: 2024-12-13T14:31:56.532275Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:31:56.535589 waagent[1493]: 2024-12-13T14:31:56.535483Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:31:56.538556 waagent[1493]: 2024-12-13T14:31:56.538473Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:31:56.541987 waagent[1493]: 2024-12-13T14:31:56.541912Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:31:56.544964 waagent[1493]: 2024-12-13T14:31:56.544894Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:31:56.547572 waagent[1493]: 2024-12-13T14:31:56.547513Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:31:56.888219 waagent[1493]: 2024-12-13T14:31:56.888136Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:31:56.891789 waagent[1493]: 2024-12-13T14:31:56.891738Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:31:56.894391 waagent[1493]: 2024-12-13T14:31:56.894333Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:31:58.301927 waagent[1493]: 2024-12-13T14:31:58.301760Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:31:58.313271 waagent[1493]: 2024-12-13T14:31:58.313187Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:31:58.316074 waagent[1493]: 2024-12-13T14:31:58.316003Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:31:58.387986 waagent[1493]: 2024-12-13T14:31:58.387855Z INFO Daemon Daemon Found private key matching thumbprint 307DACDF5FD3632F1C65800041AAE56A61E76CB3 Dec 13 14:31:58.398302 waagent[1493]: 2024-12-13T14:31:58.389361Z INFO Daemon Daemon Certificate with thumbprint 3F90D8EABA362B5002AD2A7BF7FEEE67CAAC6397 has no matching private key. Dec 13 14:31:58.398302 waagent[1493]: 2024-12-13T14:31:58.390500Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:31:58.419384 waagent[1493]: 2024-12-13T14:31:58.419315Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: e543aecd-7f74-46d6-bef9-7c3a4f742573 New eTag: 6879417132007922292] Dec 13 14:31:58.426818 waagent[1493]: 2024-12-13T14:31:58.421073Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:31:58.434018 waagent[1493]: 2024-12-13T14:31:58.433952Z INFO Daemon Daemon Starting provisioning Dec 13 14:31:58.440326 waagent[1493]: 2024-12-13T14:31:58.435187Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:31:58.440326 waagent[1493]: 2024-12-13T14:31:58.436008Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-1c166c7881] Dec 13 14:31:58.444082 waagent[1493]: 2024-12-13T14:31:58.443981Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-1c166c7881] Dec 13 14:31:58.451911 waagent[1493]: 2024-12-13T14:31:58.445638Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:31:58.451911 waagent[1493]: 2024-12-13T14:31:58.446553Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:31:58.460044 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:31:58.460291 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:31:58.460347 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:31:58.460644 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:31:58.464846 systemd-networkd[1175]: eth0: DHCPv6 lease lost Dec 13 14:31:58.466232 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:31:58.466425 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:31:58.468830 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:58.500593 systemd-networkd[1560]: enP60647s1: Link UP Dec 13 14:31:58.500604 systemd-networkd[1560]: enP60647s1: Gained carrier Dec 13 14:31:58.501996 systemd-networkd[1560]: eth0: Link UP Dec 13 14:31:58.502005 systemd-networkd[1560]: eth0: Gained carrier Dec 13 14:31:58.502426 systemd-networkd[1560]: lo: Link UP Dec 13 14:31:58.502436 systemd-networkd[1560]: lo: Gained carrier Dec 13 14:31:58.502739 systemd-networkd[1560]: eth0: Gained IPv6LL Dec 13 14:31:58.503036 systemd-networkd[1560]: Enumeration completed Dec 13 14:31:58.508035 waagent[1493]: 2024-12-13T14:31:58.504488Z INFO Daemon Daemon Create user account if not exists Dec 13 14:31:58.508035 waagent[1493]: 2024-12-13T14:31:58.506237Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:31:58.508035 waagent[1493]: 2024-12-13T14:31:58.507539Z INFO Daemon Daemon Configure sudoer Dec 13 14:31:58.503150 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:58.508999 waagent[1493]: 2024-12-13T14:31:58.508942Z INFO Daemon Daemon Configure sshd Dec 13 14:31:58.509750 waagent[1493]: 2024-12-13T14:31:58.509700Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:31:58.514409 systemd-networkd[1560]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:58.517273 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:31:58.547889 systemd-networkd[1560]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:31:58.554271 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:31:59.606943 waagent[1493]: 2024-12-13T14:31:59.606847Z INFO Daemon Daemon Provisioning complete Dec 13 14:31:59.623642 waagent[1493]: 2024-12-13T14:31:59.623559Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:31:59.626720 waagent[1493]: 2024-12-13T14:31:59.626647Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:31:59.632014 waagent[1493]: 2024-12-13T14:31:59.631948Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:31:59.900000 waagent[1569]: 2024-12-13T14:31:59.899827Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:31:59.900718 waagent[1569]: 2024-12-13T14:31:59.900650Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:31:59.900878 waagent[1569]: 2024-12-13T14:31:59.900822Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:31:59.911982 waagent[1569]: 2024-12-13T14:31:59.911913Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:31:59.912143 waagent[1569]: 2024-12-13T14:31:59.912092Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:31:59.971686 waagent[1569]: 2024-12-13T14:31:59.971559Z INFO ExtHandler ExtHandler Found private key matching thumbprint 307DACDF5FD3632F1C65800041AAE56A61E76CB3 Dec 13 14:31:59.971929 waagent[1569]: 2024-12-13T14:31:59.971870Z INFO ExtHandler ExtHandler Certificate with thumbprint 3F90D8EABA362B5002AD2A7BF7FEEE67CAAC6397 has no matching private key. Dec 13 14:31:59.972165 waagent[1569]: 2024-12-13T14:31:59.972115Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:31:59.985820 waagent[1569]: 2024-12-13T14:31:59.985748Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: c7689a7e-d7a9-46a7-ab8e-2edff8212286 New eTag: 6879417132007922292] Dec 13 14:31:59.986341 waagent[1569]: 2024-12-13T14:31:59.986282Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:32:01.293280 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:32:01.293594 systemd[1]: Stopped kubelet.service. Dec 13 14:32:01.293656 systemd[1]: kubelet.service: Consumed 1.035s CPU time. Dec 13 14:32:01.295530 systemd[1]: Starting kubelet.service... Dec 13 14:32:01.673592 waagent[1569]: 2024-12-13T14:32:01.673442Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:32:01.735751 waagent[1569]: 2024-12-13T14:32:01.735650Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1569 Dec 13 14:32:01.739208 waagent[1569]: 2024-12-13T14:32:01.739138Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:32:01.740439 waagent[1569]: 2024-12-13T14:32:01.740380Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:32:02.731954 waagent[1569]: 2024-12-13T14:32:02.731886Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:32:02.732416 waagent[1569]: 2024-12-13T14:32:02.732352Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:32:02.740857 waagent[1569]: 2024-12-13T14:32:02.740785Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:32:02.741338 waagent[1569]: 2024-12-13T14:32:02.741278Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:32:02.742394 waagent[1569]: 2024-12-13T14:32:02.742329Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:32:02.743711 waagent[1569]: 2024-12-13T14:32:02.743653Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:32:02.744116 waagent[1569]: 2024-12-13T14:32:02.744060Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:02.744268 waagent[1569]: 2024-12-13T14:32:02.744222Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:02.744788 waagent[1569]: 2024-12-13T14:32:02.744729Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:32:02.745091 waagent[1569]: 2024-12-13T14:32:02.745032Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:32:02.745091 waagent[1569]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:32:02.745091 waagent[1569]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:32:02.745091 waagent[1569]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:32:02.745091 waagent[1569]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:02.745091 waagent[1569]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:02.745091 waagent[1569]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:02.748145 waagent[1569]: 2024-12-13T14:32:02.747926Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:32:02.748408 waagent[1569]: 2024-12-13T14:32:02.748353Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:02.749243 waagent[1569]: 2024-12-13T14:32:02.749183Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:02.749926 waagent[1569]: 2024-12-13T14:32:02.749867Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:32:02.750082 waagent[1569]: 2024-12-13T14:32:02.750035Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:32:02.750307 waagent[1569]: 2024-12-13T14:32:02.750248Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:32:02.750387 waagent[1569]: 2024-12-13T14:32:02.750334Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:32:02.750564 waagent[1569]: 2024-12-13T14:32:02.750515Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:32:02.751953 waagent[1569]: 2024-12-13T14:32:02.751891Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:32:02.752483 waagent[1569]: 2024-12-13T14:32:02.752428Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:32:02.753110 waagent[1569]: 2024-12-13T14:32:02.753058Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:32:02.764443 waagent[1569]: 2024-12-13T14:32:02.764384Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:32:02.765414 waagent[1569]: 2024-12-13T14:32:02.765356Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:32:02.766350 waagent[1569]: 2024-12-13T14:32:02.766290Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:32:02.801004 waagent[1569]: 2024-12-13T14:32:02.800915Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:32:02.831876 waagent[1569]: 2024-12-13T14:32:02.831739Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1560' Dec 13 14:32:03.115051 waagent[1569]: 2024-12-13T14:32:03.114974Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:32:03.639177 waagent[1493]: 2024-12-13T14:32:03.638998Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:32:03.645455 waagent[1493]: 2024-12-13T14:32:03.645380Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:32:04.530960 systemd[1]: Started kubelet.service. Dec 13 14:32:04.614447 kubelet[1605]: E1213 14:32:04.614394 1605 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:04.619441 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:04.619605 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:04.781358 waagent[1600]: 2024-12-13T14:32:04.781248Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:32:04.783770 waagent[1600]: 2024-12-13T14:32:04.783646Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:32:04.783918 waagent[1600]: 2024-12-13T14:32:04.783832Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:32:04.784048 waagent[1600]: 2024-12-13T14:32:04.783997Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 14:32:04.793661 waagent[1600]: 2024-12-13T14:32:04.793555Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:32:04.794079 waagent[1600]: 2024-12-13T14:32:04.794021Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:04.794246 waagent[1600]: 2024-12-13T14:32:04.794197Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:04.806329 waagent[1600]: 2024-12-13T14:32:04.806255Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:32:04.818181 waagent[1600]: 2024-12-13T14:32:04.818120Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:32:04.819119 waagent[1600]: 2024-12-13T14:32:04.819058Z INFO ExtHandler Dec 13 14:32:04.819266 waagent[1600]: 2024-12-13T14:32:04.819217Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 3c2d4186-f92e-4265-91c8-67d5d97a49f0 eTag: 6879417132007922292 source: Fabric] Dec 13 14:32:04.819975 waagent[1600]: 2024-12-13T14:32:04.819919Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:32:04.821065 waagent[1600]: 2024-12-13T14:32:04.821004Z INFO ExtHandler Dec 13 14:32:04.821200 waagent[1600]: 2024-12-13T14:32:04.821148Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:32:04.827933 waagent[1600]: 2024-12-13T14:32:04.827880Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:32:04.828353 waagent[1600]: 2024-12-13T14:32:04.828304Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:32:04.849367 waagent[1600]: 2024-12-13T14:32:04.849278Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:32:04.914474 waagent[1600]: 2024-12-13T14:32:04.914342Z INFO ExtHandler Downloaded certificate {'thumbprint': '3F90D8EABA362B5002AD2A7BF7FEEE67CAAC6397', 'hasPrivateKey': False} Dec 13 14:32:04.915440 waagent[1600]: 2024-12-13T14:32:04.915371Z INFO ExtHandler Downloaded certificate {'thumbprint': '307DACDF5FD3632F1C65800041AAE56A61E76CB3', 'hasPrivateKey': True} Dec 13 14:32:04.916434 waagent[1600]: 2024-12-13T14:32:04.916368Z INFO ExtHandler Fetch goal state completed Dec 13 14:32:04.939154 waagent[1600]: 2024-12-13T14:32:04.939044Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:32:04.950963 waagent[1600]: 2024-12-13T14:32:04.950876Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1600 Dec 13 14:32:04.953988 waagent[1600]: 2024-12-13T14:32:04.953923Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:32:04.954958 waagent[1600]: 2024-12-13T14:32:04.954901Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:32:04.955242 waagent[1600]: 2024-12-13T14:32:04.955187Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:32:04.957210 waagent[1600]: 2024-12-13T14:32:04.957153Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:32:04.961969 waagent[1600]: 2024-12-13T14:32:04.961915Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:32:04.962355 waagent[1600]: 2024-12-13T14:32:04.962296Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:32:04.970531 waagent[1600]: 2024-12-13T14:32:04.970476Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:32:04.971035 waagent[1600]: 2024-12-13T14:32:04.970977Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:32:04.976989 waagent[1600]: 2024-12-13T14:32:04.976895Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:32:04.978026 waagent[1600]: 2024-12-13T14:32:04.977960Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:32:04.979459 waagent[1600]: 2024-12-13T14:32:04.979394Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:32:04.979890 waagent[1600]: 2024-12-13T14:32:04.979836Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:04.980304 waagent[1600]: 2024-12-13T14:32:04.980249Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:32:04.980482 waagent[1600]: 2024-12-13T14:32:04.980417Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:04.981362 waagent[1600]: 2024-12-13T14:32:04.981304Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:32:04.981584 waagent[1600]: 2024-12-13T14:32:04.981528Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:32:04.981772 waagent[1600]: 2024-12-13T14:32:04.981717Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:32:04.982057 waagent[1600]: 2024-12-13T14:32:04.982004Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:32:04.982509 waagent[1600]: 2024-12-13T14:32:04.982455Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:32:04.982733 waagent[1600]: 2024-12-13T14:32:04.982681Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:32:04.982992 waagent[1600]: 2024-12-13T14:32:04.982941Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:32:04.983094 waagent[1600]: 2024-12-13T14:32:04.983012Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:32:04.983094 waagent[1600]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:32:04.983094 waagent[1600]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:32:04.983094 waagent[1600]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:32:04.983094 waagent[1600]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:04.983094 waagent[1600]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:04.983094 waagent[1600]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:32:04.985891 waagent[1600]: 2024-12-13T14:32:04.985763Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:32:04.986080 waagent[1600]: 2024-12-13T14:32:04.986010Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:32:04.986244 waagent[1600]: 2024-12-13T14:32:04.986186Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:32:04.990005 waagent[1600]: 2024-12-13T14:32:04.989733Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:32:05.013119 waagent[1600]: 2024-12-13T14:32:05.013037Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:32:05.018601 waagent[1600]: 2024-12-13T14:32:05.018529Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:32:05.018601 waagent[1600]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:32:05.018601 waagent[1600]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:32:05.018601 waagent[1600]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:f0:70 brd ff:ff:ff:ff:ff:ff Dec 13 14:32:05.018601 waagent[1600]: 3: enP60647s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:35:f0:70 brd ff:ff:ff:ff:ff:ff\ altname enP60647p0s2 Dec 13 14:32:05.018601 waagent[1600]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:32:05.018601 waagent[1600]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:32:05.018601 waagent[1600]: 2: eth0 inet 10.200.8.37/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:32:05.018601 waagent[1600]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:32:05.018601 waagent[1600]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:32:05.018601 waagent[1600]: 2: eth0 inet6 fe80::7e1e:52ff:fe35:f070/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:32:05.037160 waagent[1600]: 2024-12-13T14:32:05.037032Z INFO ExtHandler ExtHandler Dec 13 14:32:05.038955 waagent[1600]: 2024-12-13T14:32:05.038895Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 5572e1d9-678c-42a8-b56f-0c2c144c9c83 correlation f5eff620-408b-48e5-837e-621275568184 created: 2024-12-13T14:31:10.649399Z] Dec 13 14:32:05.042782 waagent[1600]: 2024-12-13T14:32:05.042728Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:32:05.047232 waagent[1600]: 2024-12-13T14:32:05.047184Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 10 ms] Dec 13 14:32:05.071897 waagent[1600]: 2024-12-13T14:32:05.071818Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:32:05.495421 waagent[1600]: 2024-12-13T14:32:05.495341Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 9DD22E80-D947-4B3D-B252-2AB147EFDDF4;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:32:05.588614 waagent[1600]: 2024-12-13T14:32:05.588499Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:32:05.588614 waagent[1600]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.588614 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.588614 waagent[1600]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.588614 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.588614 waagent[1600]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.588614 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.588614 waagent[1600]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:32:05.588614 waagent[1600]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:32:05.588614 waagent[1600]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:32:05.595713 waagent[1600]: 2024-12-13T14:32:05.595612Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:32:05.595713 waagent[1600]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.595713 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.595713 waagent[1600]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.595713 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.595713 waagent[1600]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:32:05.595713 waagent[1600]: pkts bytes target prot opt in out source destination Dec 13 14:32:05.595713 waagent[1600]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:32:05.595713 waagent[1600]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:32:05.595713 waagent[1600]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:32:05.596306 waagent[1600]: 2024-12-13T14:32:05.596252Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:32:14.793245 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:32:14.793554 systemd[1]: Stopped kubelet.service. Dec 13 14:32:14.795607 systemd[1]: Starting kubelet.service... Dec 13 14:32:14.873448 systemd[1]: Started kubelet.service. Dec 13 14:32:15.392571 kubelet[1663]: E1213 14:32:15.392514 1663 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:15.394591 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:15.394752 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:25.543054 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:32:25.543314 systemd[1]: Stopped kubelet.service. Dec 13 14:32:25.545482 systemd[1]: Starting kubelet.service... Dec 13 14:32:25.625399 systemd[1]: Started kubelet.service. Dec 13 14:32:26.144997 kubelet[1673]: E1213 14:32:26.144936 1673 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:26.146853 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:26.147012 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:33.055372 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 14:32:36.293185 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:32:36.293595 systemd[1]: Stopped kubelet.service. Dec 13 14:32:36.295487 systemd[1]: Starting kubelet.service... Dec 13 14:32:36.322515 update_engine[1400]: I1213 14:32:36.321857 1400 update_attempter.cc:509] Updating boot flags... Dec 13 14:32:36.840666 systemd[1]: Started kubelet.service. Dec 13 14:32:36.965066 kubelet[1724]: E1213 14:32:36.965028 1724 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:36.966887 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:36.967041 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:47.043244 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:32:47.043568 systemd[1]: Stopped kubelet.service. Dec 13 14:32:47.045565 systemd[1]: Starting kubelet.service... Dec 13 14:32:47.196259 systemd[1]: Started kubelet.service. Dec 13 14:32:47.639968 kubelet[1762]: E1213 14:32:47.639909 1762 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:47.641897 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:47.642054 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:47.997388 systemd[1]: Created slice system-sshd.slice. Dec 13 14:32:47.999178 systemd[1]: Started sshd@0-10.200.8.37:22-10.200.16.10:33912.service. Dec 13 14:32:51.001116 sshd[1769]: Accepted publickey for core from 10.200.16.10 port 33912 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:51.002573 sshd[1769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:51.007022 systemd-logind[1399]: New session 3 of user core. Dec 13 14:32:51.007608 systemd[1]: Started session-3.scope. Dec 13 14:32:51.613928 systemd[1]: Started sshd@1-10.200.8.37:22-10.200.16.10:46116.service. Dec 13 14:32:52.323789 sshd[1774]: Accepted publickey for core from 10.200.16.10 port 46116 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:52.325217 sshd[1774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:52.329848 systemd[1]: Started session-4.scope. Dec 13 14:32:52.330325 systemd-logind[1399]: New session 4 of user core. Dec 13 14:32:52.824776 sshd[1774]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:52.827850 systemd[1]: sshd@1-10.200.8.37:22-10.200.16.10:46116.service: Deactivated successfully. Dec 13 14:32:52.828663 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:32:52.829276 systemd-logind[1399]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:32:52.830067 systemd-logind[1399]: Removed session 4. Dec 13 14:32:52.942991 systemd[1]: Started sshd@2-10.200.8.37:22-10.200.16.10:46120.service. Dec 13 14:32:53.656206 sshd[1780]: Accepted publickey for core from 10.200.16.10 port 46120 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:53.657782 sshd[1780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:53.663045 systemd[1]: Started session-5.scope. Dec 13 14:32:53.663747 systemd-logind[1399]: New session 5 of user core. Dec 13 14:32:54.152603 sshd[1780]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:54.155453 systemd[1]: sshd@2-10.200.8.37:22-10.200.16.10:46120.service: Deactivated successfully. Dec 13 14:32:54.156281 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:32:54.157176 systemd-logind[1399]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:32:54.158070 systemd-logind[1399]: Removed session 5. Dec 13 14:32:54.271823 systemd[1]: Started sshd@3-10.200.8.37:22-10.200.16.10:46128.service. Dec 13 14:32:54.994764 sshd[1786]: Accepted publickey for core from 10.200.16.10 port 46128 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:54.996230 sshd[1786]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:55.001158 systemd[1]: Started session-6.scope. Dec 13 14:32:55.001893 systemd-logind[1399]: New session 6 of user core. Dec 13 14:32:55.496318 sshd[1786]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:55.499382 systemd[1]: sshd@3-10.200.8.37:22-10.200.16.10:46128.service: Deactivated successfully. Dec 13 14:32:55.500341 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:32:55.501031 systemd-logind[1399]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:32:55.501771 systemd-logind[1399]: Removed session 6. Dec 13 14:32:55.614439 systemd[1]: Started sshd@4-10.200.8.37:22-10.200.16.10:46136.service. Dec 13 14:32:56.336313 sshd[1792]: Accepted publickey for core from 10.200.16.10 port 46136 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:56.337906 sshd[1792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:56.342914 systemd[1]: Started session-7.scope. Dec 13 14:32:56.343646 systemd-logind[1399]: New session 7 of user core. Dec 13 14:32:56.882302 sudo[1795]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:32:56.882683 sudo[1795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:56.895026 dbus-daemon[1385]: Э@8AV: received setenforce notice (enforcing=-1170821568) Dec 13 14:32:56.896890 sudo[1795]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:57.018140 sshd[1792]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:57.022038 systemd[1]: sshd@4-10.200.8.37:22-10.200.16.10:46136.service: Deactivated successfully. Dec 13 14:32:57.022940 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:32:57.023589 systemd-logind[1399]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:32:57.024428 systemd-logind[1399]: Removed session 7. Dec 13 14:32:57.137036 systemd[1]: Started sshd@5-10.200.8.37:22-10.200.16.10:46148.service. Dec 13 14:32:57.726549 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 14:32:57.726900 systemd[1]: Stopped kubelet.service. Dec 13 14:32:57.728691 systemd[1]: Starting kubelet.service... Dec 13 14:32:57.851204 sshd[1799]: Accepted publickey for core from 10.200.16.10 port 46148 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:57.853090 sshd[1799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:57.859778 systemd[1]: Started session-8.scope. Dec 13 14:32:57.860431 systemd-logind[1399]: New session 8 of user core. Dec 13 14:32:58.237156 sudo[1805]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:32:58.237768 sudo[1805]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:58.240595 sudo[1805]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:58.245661 sudo[1804]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:32:58.246005 sudo[1804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:58.254776 systemd[1]: Stopping audit-rules.service... Dec 13 14:32:58.255000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:58.259882 kernel: kauditd_printk_skb: 128 callbacks suppressed Dec 13 14:32:58.259976 kernel: audit: type=1305 audit(1734100378.255:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:58.266724 auditctl[1808]: No rules Dec 13 14:32:58.267139 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:32:58.267278 systemd[1]: Stopped audit-rules.service. Dec 13 14:32:58.255000 audit[1808]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7f3b2cf0 a2=420 a3=0 items=0 ppid=1 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:58.270977 systemd[1]: Starting audit-rules.service... Dec 13 14:32:58.284382 kernel: audit: type=1300 audit(1734100378.255:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7f3b2cf0 a2=420 a3=0 items=0 ppid=1 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:58.255000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:58.289074 kernel: audit: type=1327 audit(1734100378.255:211): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:58.289144 kernel: audit: type=1131 audit(1734100378.265:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.479185 augenrules[1825]: No rules Dec 13 14:32:58.479840 systemd[1]: Finished audit-rules.service. Dec 13 14:32:58.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.483975 sudo[1804]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:58.491912 kernel: audit: type=1130 audit(1734100378.479:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.491990 kernel: audit: type=1106 audit(1734100378.483:214): pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.483000 audit[1804]: USER_END pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.483000 audit[1804]: CRED_DISP pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.514473 kernel: audit: type=1104 audit(1734100378.483:215): pid=1804 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.598683 sshd[1799]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:58.599000 audit[1799]: USER_END pid=1799 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:58.601514 systemd[1]: sshd@5-10.200.8.37:22-10.200.16.10:46148.service: Deactivated successfully. Dec 13 14:32:58.602233 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:32:58.603535 systemd-logind[1399]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:32:58.604419 systemd-logind[1399]: Removed session 8. Dec 13 14:32:58.599000 audit[1799]: CRED_DISP pid=1799 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:58.615814 kernel: audit: type=1106 audit(1734100378.599:216): pid=1799 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:58.615859 kernel: audit: type=1104 audit(1734100378.599:217): pid=1799 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:58.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.16.10:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.627809 kernel: audit: type=1131 audit(1734100378.600:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.16.10:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.16.10:47964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:58.717751 systemd[1]: Started sshd@6-10.200.8.37:22-10.200.16.10:47964.service. Dec 13 14:32:59.427000 audit[1831]: USER_ACCT pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:59.428498 sshd[1831]: Accepted publickey for core from 10.200.16.10 port 47964 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:32:59.428000 audit[1831]: CRED_ACQ pid=1831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:59.428000 audit[1831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc89115c0 a2=3 a3=0 items=0 ppid=1 pid=1831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:59.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:59.430040 sshd[1831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:59.434849 systemd[1]: Started session-9.scope. Dec 13 14:32:59.435292 systemd-logind[1399]: New session 9 of user core. Dec 13 14:32:59.439000 audit[1831]: USER_START pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:59.440000 audit[1833]: CRED_ACQ pid=1833 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:32:59.814000 audit[1834]: USER_ACCT pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.815426 sudo[1834]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:32:59.814000 audit[1834]: CRED_REFR pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.815887 sudo[1834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:59.816000 audit[1834]: USER_START pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.841039 systemd[1]: Starting docker.service... Dec 13 14:32:59.878228 env[1844]: time="2024-12-13T14:32:59.878189806Z" level=info msg="Starting up" Dec 13 14:32:59.879650 env[1844]: time="2024-12-13T14:32:59.879620233Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:32:59.879650 env[1844]: time="2024-12-13T14:32:59.879638433Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:32:59.879650 env[1844]: time="2024-12-13T14:32:59.879659433Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:32:59.879879 env[1844]: time="2024-12-13T14:32:59.879672834Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:32:59.881657 env[1844]: time="2024-12-13T14:32:59.881626271Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:32:59.881657 env[1844]: time="2024-12-13T14:32:59.881644471Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:32:59.881657 env[1844]: time="2024-12-13T14:32:59.881660171Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:32:59.881930 env[1844]: time="2024-12-13T14:32:59.881670672Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:32:59.889338 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4121763030-merged.mount: Deactivated successfully. Dec 13 14:33:02.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:02.463818 systemd[1]: Started kubelet.service. Dec 13 14:33:02.505882 kubelet[1853]: E1213 14:33:02.505826 1853 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:02.507575 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:02.507732 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:02.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:04.111495 env[1844]: time="2024-12-13T14:33:04.111444757Z" level=info msg="Loading containers: start." Dec 13 14:33:04.144000 audit[1879]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.149133 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:33:04.149209 kernel: audit: type=1325 audit(1734100384.144:230): table=nat:5 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.144000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc00b4a000 a2=0 a3=7ffc00b49fec items=0 ppid=1844 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.144000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:33:04.195653 kernel: audit: type=1300 audit(1734100384.144:230): arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc00b4a000 a2=0 a3=7ffc00b49fec items=0 ppid=1844 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.195782 kernel: audit: type=1327 audit(1734100384.144:230): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:33:04.195821 kernel: audit: type=1325 audit(1734100384.153:231): table=filter:6 family=2 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.153000 audit[1881]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.153000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd88c5fd30 a2=0 a3=7ffd88c5fd1c items=0 ppid=1844 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.250238 kernel: audit: type=1300 audit(1734100384.153:231): arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd88c5fd30 a2=0 a3=7ffd88c5fd1c items=0 ppid=1844 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.252217 kernel: audit: type=1327 audit(1734100384.153:231): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:33:04.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:33:04.159000 audit[1883]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.271859 kernel: audit: type=1325 audit(1734100384.159:232): table=filter:7 family=2 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.271969 kernel: audit: type=1300 audit(1734100384.159:232): arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd489fef10 a2=0 a3=7ffd489feefc items=0 ppid=1844 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.159000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd489fef10 a2=0 a3=7ffd489feefc items=0 ppid=1844 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:33:04.304077 kernel: audit: type=1327 audit(1734100384.159:232): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:33:04.307833 kernel: audit: type=1325 audit(1734100384.163:233): table=filter:8 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.163000 audit[1885]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.163000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdbed7f010 a2=0 a3=7ffdbed7effc items=0 ppid=1844 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:33:04.164000 audit[1887]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.164000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff579ecf0 a2=0 a3=7ffff579ecdc items=0 ppid=1844 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:33:04.172000 audit[1889]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.172000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc28b6360 a2=0 a3=7ffcc28b634c items=0 ppid=1844 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:33:04.326000 audit[1891]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.326000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdeb0c8590 a2=0 a3=7ffdeb0c857c items=0 ppid=1844 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:33:04.328000 audit[1893]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.328000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeac41c6a0 a2=0 a3=7ffeac41c68c items=0 ppid=1844 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:33:04.330000 audit[1895]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.330000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd0fc95e50 a2=0 a3=7ffd0fc95e3c items=0 ppid=1844 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:33:04.348000 audit[1899]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.348000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeeed9c540 a2=0 a3=7ffeeed9c52c items=0 ppid=1844 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:33:04.353000 audit[1900]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.353000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe3cfc03d0 a2=0 a3=7ffe3cfc03bc items=0 ppid=1844 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:33:04.402035 kernel: Initializing XFRM netlink socket Dec 13 14:33:04.414393 env[1844]: time="2024-12-13T14:33:04.414352776Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:33:04.443000 audit[1908]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.443000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe4bc71f00 a2=0 a3=7ffe4bc71eec items=0 ppid=1844 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.443000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:33:04.456000 audit[1911]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.456000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe0aae7ca0 a2=0 a3=7ffe0aae7c8c items=0 ppid=1844 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:33:04.459000 audit[1914]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.459000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffb0815380 a2=0 a3=7fffb081536c items=0 ppid=1844 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.459000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:33:04.461000 audit[1916]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.461000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe03b07290 a2=0 a3=7ffe03b0727c items=0 ppid=1844 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.461000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:33:04.463000 audit[1918]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.463000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffa90ae130 a2=0 a3=7fffa90ae11c items=0 ppid=1844 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:33:04.466000 audit[1920]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.466000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdc33178d0 a2=0 a3=7ffdc33178bc items=0 ppid=1844 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.466000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:33:04.468000 audit[1922]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.468000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdad2b23f0 a2=0 a3=7ffdad2b23dc items=0 ppid=1844 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:33:04.470000 audit[1924]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.470000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffecf3a9250 a2=0 a3=7ffecf3a923c items=0 ppid=1844 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.470000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:33:04.472000 audit[1926]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.472000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffe8343cb0 a2=0 a3=7fffe8343c9c items=0 ppid=1844 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:33:04.474000 audit[1928]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.474000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff72ad3980 a2=0 a3=7fff72ad396c items=0 ppid=1844 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:33:04.476000 audit[1930]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.476000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff7e09b630 a2=0 a3=7fff7e09b61c items=0 ppid=1844 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:33:04.477940 systemd-networkd[1560]: docker0: Link UP Dec 13 14:33:04.499000 audit[1934]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.499000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffccd28cf40 a2=0 a3=7ffccd28cf2c items=0 ppid=1844 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.499000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:33:04.504000 audit[1935]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:04.504000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc3253b200 a2=0 a3=7ffc3253b1ec items=0 ppid=1844 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:04.504000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:33:04.506027 env[1844]: time="2024-12-13T14:33:04.505994895Z" level=info msg="Loading containers: done." Dec 13 14:33:04.516926 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2082599828-merged.mount: Deactivated successfully. Dec 13 14:33:04.588716 env[1844]: time="2024-12-13T14:33:04.588667765Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:33:04.588997 env[1844]: time="2024-12-13T14:33:04.588962570Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:33:04.589147 env[1844]: time="2024-12-13T14:33:04.589120172Z" level=info msg="Daemon has completed initialization" Dec 13 14:33:04.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:04.639473 systemd[1]: Started docker.service. Dec 13 14:33:04.649260 env[1844]: time="2024-12-13T14:33:04.649207768Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:33:12.543187 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Dec 13 14:33:12.543548 systemd[1]: Stopped kubelet.service. Dec 13 14:33:12.567081 kernel: kauditd_printk_skb: 63 callbacks suppressed Dec 13 14:33:12.567223 kernel: audit: type=1130 audit(1734100392.542:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:12.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:12.550761 systemd[1]: Starting kubelet.service... Dec 13 14:33:12.570397 kernel: audit: type=1131 audit(1734100392.542:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:12.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:13.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:13.156241 systemd[1]: Started kubelet.service. Dec 13 14:33:13.170825 kernel: audit: type=1130 audit(1734100393.155:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:13.207356 kubelet[1977]: E1213 14:33:13.207312 1977 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:13.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:13.209251 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:13.209364 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:13.222836 kernel: audit: type=1131 audit(1734100393.208:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:13.526478 env[1409]: time="2024-12-13T14:33:13.526329096Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:33:14.221937 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4272494497.mount: Deactivated successfully. Dec 13 14:33:16.408489 env[1409]: time="2024-12-13T14:33:16.408433258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:16.416838 env[1409]: time="2024-12-13T14:33:16.416727759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:16.421279 env[1409]: time="2024-12-13T14:33:16.421220513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:16.425484 env[1409]: time="2024-12-13T14:33:16.425454865Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:16.426136 env[1409]: time="2024-12-13T14:33:16.426105173Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:33:16.436176 env[1409]: time="2024-12-13T14:33:16.436148995Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:33:18.500056 env[1409]: time="2024-12-13T14:33:18.500001043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:18.506769 env[1409]: time="2024-12-13T14:33:18.506723020Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:18.513315 env[1409]: time="2024-12-13T14:33:18.513270096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:18.518145 env[1409]: time="2024-12-13T14:33:18.518109152Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:18.518867 env[1409]: time="2024-12-13T14:33:18.518833260Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:33:18.529090 env[1409]: time="2024-12-13T14:33:18.529051078Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:33:19.840212 env[1409]: time="2024-12-13T14:33:19.840149079Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:19.846559 env[1409]: time="2024-12-13T14:33:19.846515350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:19.854314 env[1409]: time="2024-12-13T14:33:19.854273538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:19.860184 env[1409]: time="2024-12-13T14:33:19.860149304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:19.860922 env[1409]: time="2024-12-13T14:33:19.860890312Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:33:19.872109 env[1409]: time="2024-12-13T14:33:19.872076838Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:33:21.167009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3703695390.mount: Deactivated successfully. Dec 13 14:33:21.744156 env[1409]: time="2024-12-13T14:33:21.744097958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:21.749803 env[1409]: time="2024-12-13T14:33:21.749749818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:21.755552 env[1409]: time="2024-12-13T14:33:21.755512880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:21.760187 env[1409]: time="2024-12-13T14:33:21.760149630Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:21.761207 env[1409]: time="2024-12-13T14:33:21.761163641Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:33:21.775475 env[1409]: time="2024-12-13T14:33:21.775436494Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:33:22.458906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2391854725.mount: Deactivated successfully. Dec 13 14:33:23.293051 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. Dec 13 14:33:23.293328 systemd[1]: Stopped kubelet.service. Dec 13 14:33:23.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.308877 kernel: audit: type=1130 audit(1734100403.291:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.295197 systemd[1]: Starting kubelet.service... Dec 13 14:33:23.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.329814 kernel: audit: type=1131 audit(1734100403.291:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.381511 systemd[1]: Started kubelet.service. Dec 13 14:33:23.396813 kernel: audit: type=1130 audit(1734100403.380:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.429310 kubelet[2011]: E1213 14:33:23.429256 2011 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:33:23.431123 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:33:23.431279 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:33:23.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:23.444923 kernel: audit: type=1131 audit(1734100403.429:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:33:24.451729 env[1409]: time="2024-12-13T14:33:24.451674026Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:24.460410 env[1409]: time="2024-12-13T14:33:24.460371712Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:24.476203 env[1409]: time="2024-12-13T14:33:24.476152070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:24.487244 env[1409]: time="2024-12-13T14:33:24.487202380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:24.488014 env[1409]: time="2024-12-13T14:33:24.487981888Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:33:24.498179 env[1409]: time="2024-12-13T14:33:24.498146890Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:33:25.000336 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3857197346.mount: Deactivated successfully. Dec 13 14:33:25.030813 env[1409]: time="2024-12-13T14:33:25.030758802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:25.041536 env[1409]: time="2024-12-13T14:33:25.041488406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:25.046310 env[1409]: time="2024-12-13T14:33:25.046271753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:25.051586 env[1409]: time="2024-12-13T14:33:25.051551505Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:25.052009 env[1409]: time="2024-12-13T14:33:25.051977709Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:33:25.062204 env[1409]: time="2024-12-13T14:33:25.062163008Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:33:25.733596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2007975843.mount: Deactivated successfully. Dec 13 14:33:28.525435 env[1409]: time="2024-12-13T14:33:28.525380781Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.538215 env[1409]: time="2024-12-13T14:33:28.538175498Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.544055 env[1409]: time="2024-12-13T14:33:28.544019451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.555258 env[1409]: time="2024-12-13T14:33:28.555229253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.556005 env[1409]: time="2024-12-13T14:33:28.555972960Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:33:32.063136 systemd[1]: Stopped kubelet.service. Dec 13 14:33:32.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.077820 kernel: audit: type=1130 audit(1734100412.061:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.077907 kernel: audit: type=1131 audit(1734100412.068:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.078632 systemd[1]: Starting kubelet.service... Dec 13 14:33:32.109317 systemd[1]: Reloading. Dec 13 14:33:32.215361 /usr/lib/systemd/system-generators/torcx-generator[2111]: time="2024-12-13T14:33:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:32.215401 /usr/lib/systemd/system-generators/torcx-generator[2111]: time="2024-12-13T14:33:32Z" level=info msg="torcx already run" Dec 13 14:33:32.320765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:32.320785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:32.337566 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.432397 kernel: audit: type=1400 audit(1734100412.403:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.432494 kernel: audit: type=1400 audit(1734100412.403:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.445544 kernel: audit: type=1400 audit(1734100412.403:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.472304 kernel: audit: type=1400 audit(1734100412.403:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.472396 kernel: audit: type=1400 audit(1734100412.403:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.490089 kernel: audit: type=1400 audit(1734100412.403:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.490161 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:33:32.490186 kernel: audit: type=1400 audit(1734100412.403:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit: BPF prog-id=41 op=LOAD Dec 13 14:33:32.431000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit: BPF prog-id=42 op=LOAD Dec 13 14:33:32.444000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit: BPF prog-id=43 op=LOAD Dec 13 14:33:32.457000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit: BPF prog-id=44 op=LOAD Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit: BPF prog-id=45 op=LOAD Dec 13 14:33:32.471000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:33:32.471000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.484000 audit: BPF prog-id=46 op=LOAD Dec 13 14:33:32.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit: BPF prog-id=47 op=LOAD Dec 13 14:33:32.501000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:33:32.501000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.501000 audit: BPF prog-id=48 op=LOAD Dec 13 14:33:32.501000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit: BPF prog-id=49 op=LOAD Dec 13 14:33:32.504000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit: BPF prog-id=50 op=LOAD Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.504000 audit: BPF prog-id=51 op=LOAD Dec 13 14:33:32.504000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:33:32.504000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.505000 audit: BPF prog-id=52 op=LOAD Dec 13 14:33:32.505000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit: BPF prog-id=53 op=LOAD Dec 13 14:33:32.509000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit: BPF prog-id=54 op=LOAD Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.509000 audit: BPF prog-id=55 op=LOAD Dec 13 14:33:32.509000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:33:32.509000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:33:32.527319 systemd[1]: Started kubelet.service. Dec 13 14:33:32.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.541303 systemd[1]: Stopping kubelet.service... Dec 13 14:33:32.542299 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:33:32.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.542499 systemd[1]: Stopped kubelet.service. Dec 13 14:33:32.544394 systemd[1]: Starting kubelet.service... Dec 13 14:33:32.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:32.699322 systemd[1]: Started kubelet.service. Dec 13 14:33:33.339203 kubelet[2186]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:33.339203 kubelet[2186]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:33:33.339203 kubelet[2186]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:33.339203 kubelet[2186]: I1213 14:33:33.338838 2186 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:33:33.806790 kubelet[2186]: I1213 14:33:33.806756 2186 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:33:33.806790 kubelet[2186]: I1213 14:33:33.806784 2186 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:33:33.807091 kubelet[2186]: I1213 14:33:33.807070 2186 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:33:33.838001 kubelet[2186]: I1213 14:33:33.837965 2186 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:33.838331 kubelet[2186]: E1213 14:33:33.838312 2186 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.848961 kubelet[2186]: I1213 14:33:33.848932 2186 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:33:33.850719 kubelet[2186]: I1213 14:33:33.850690 2186 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:33:33.850963 kubelet[2186]: I1213 14:33:33.850940 2186 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:33:33.851103 kubelet[2186]: I1213 14:33:33.850973 2186 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:33:33.851103 kubelet[2186]: I1213 14:33:33.850987 2186 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:33:33.851197 kubelet[2186]: I1213 14:33:33.851103 2186 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:33.851245 kubelet[2186]: I1213 14:33:33.851233 2186 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:33:33.851286 kubelet[2186]: I1213 14:33:33.851253 2186 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:33:33.851692 kubelet[2186]: W1213 14:33:33.851654 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.851771 kubelet[2186]: E1213 14:33:33.851702 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.851771 kubelet[2186]: I1213 14:33:33.851750 2186 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:33:33.851771 kubelet[2186]: I1213 14:33:33.851768 2186 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:33:33.853390 kubelet[2186]: W1213 14:33:33.853213 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.853390 kubelet[2186]: E1213 14:33:33.853257 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.853537 kubelet[2186]: I1213 14:33:33.853445 2186 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:33:33.857286 kubelet[2186]: I1213 14:33:33.857259 2186 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:33:33.863153 kubelet[2186]: W1213 14:33:33.863126 2186 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:33:33.866975 kubelet[2186]: I1213 14:33:33.866948 2186 server.go:1256] "Started kubelet" Dec 13 14:33:33.870000 audit[2186]: AVC avc: denied { mac_admin } for pid=2186 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.870000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:33.870000 audit[2186]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c39500 a1=c000c252c0 a2=c000c394d0 a3=25 items=0 ppid=1 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.870000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:33.871000 audit[2186]: AVC avc: denied { mac_admin } for pid=2186 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.871000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:33.871000 audit[2186]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c34ea0 a1=c000c252d8 a2=c000c39590 a3=25 items=0 ppid=1 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:33.872414 kubelet[2186]: I1213 14:33:33.871840 2186 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:33:33.872414 kubelet[2186]: I1213 14:33:33.871889 2186 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:33:33.872414 kubelet[2186]: I1213 14:33:33.871973 2186 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:33:33.874000 audit[2196]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.874000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd1dc7d80 a2=0 a3=7fffd1dc7d6c items=0 ppid=2186 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:33.875000 audit[2197]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.875000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5d813290 a2=0 a3=7ffd5d81327c items=0 ppid=2186 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:33:33.878449 kubelet[2186]: I1213 14:33:33.878024 2186 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:33:33.878745 kubelet[2186]: E1213 14:33:33.878728 2186 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.37:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.37:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-1c166c7881.1810c32385653fff default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-1c166c7881,UID:ci-3510.3.6-a-1c166c7881,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-1c166c7881,},FirstTimestamp:2024-12-13 14:33:33.866917887 +0000 UTC m=+1.162317818,LastTimestamp:2024-12-13 14:33:33.866917887 +0000 UTC m=+1.162317818,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-1c166c7881,}" Dec 13 14:33:33.879486 kubelet[2186]: I1213 14:33:33.879047 2186 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:33:33.880351 kubelet[2186]: I1213 14:33:33.880330 2186 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:33:33.880591 kubelet[2186]: I1213 14:33:33.880544 2186 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:33:33.881980 kubelet[2186]: E1213 14:33:33.881964 2186 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:33:33.882676 kubelet[2186]: I1213 14:33:33.882653 2186 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:33:33.883000 audit[2199]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.883000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe9ee47740 a2=0 a3=7ffe9ee4772c items=0 ppid=2186 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:33.884454 kubelet[2186]: I1213 14:33:33.884425 2186 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:33:33.884536 kubelet[2186]: I1213 14:33:33.884495 2186 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:33:33.885209 kubelet[2186]: E1213 14:33:33.885186 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="200ms" Dec 13 14:33:33.886261 kubelet[2186]: I1213 14:33:33.886231 2186 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:33:33.886261 kubelet[2186]: I1213 14:33:33.886260 2186 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:33:33.886450 kubelet[2186]: I1213 14:33:33.886326 2186 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:33:33.887000 audit[2201]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.887000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdacde0900 a2=0 a3=7ffdacde08ec items=0 ppid=2186 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:33.902051 kubelet[2186]: W1213 14:33:33.901972 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.902051 kubelet[2186]: E1213 14:33:33.902053 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.928861 kubelet[2186]: I1213 14:33:33.928832 2186 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:33:33.928861 kubelet[2186]: I1213 14:33:33.928864 2186 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:33:33.929054 kubelet[2186]: I1213 14:33:33.928883 2186 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:33.935284 kubelet[2186]: I1213 14:33:33.935258 2186 policy_none.go:49] "None policy: Start" Dec 13 14:33:33.935924 kubelet[2186]: I1213 14:33:33.935903 2186 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:33:33.935924 kubelet[2186]: I1213 14:33:33.935929 2186 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:33:33.944061 systemd[1]: Created slice kubepods.slice. Dec 13 14:33:33.948533 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:33:33.951637 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:33:33.956457 kubelet[2186]: I1213 14:33:33.956436 2186 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:33:33.955000 audit[2186]: AVC avc: denied { mac_admin } for pid=2186 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.955000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:33.955000 audit[2186]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d0da10 a1=c000dc94b8 a2=c000d0d9e0 a3=25 items=0 ppid=1 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:33.956833 kubelet[2186]: I1213 14:33:33.956543 2186 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:33:33.956833 kubelet[2186]: I1213 14:33:33.956774 2186 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:33:33.959542 kubelet[2186]: E1213 14:33:33.959522 2186 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:33.985513 kubelet[2186]: I1213 14:33:33.985481 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:33.986126 kubelet[2186]: E1213 14:33:33.986087 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:33.986000 audit[2209]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.986000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffc6791040 a2=0 a3=7fffc679102c items=0 ppid=2186 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:33:33.987337 kubelet[2186]: I1213 14:33:33.987306 2186 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:33:33.987000 audit[2211]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:33.987000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe580096a0 a2=0 a3=7ffe5800968c items=0 ppid=2186 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:33.989084 kubelet[2186]: I1213 14:33:33.988973 2186 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:33:33.989084 kubelet[2186]: I1213 14:33:33.988999 2186 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:33:33.989084 kubelet[2186]: I1213 14:33:33.989020 2186 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:33:33.989084 kubelet[2186]: E1213 14:33:33.989063 2186 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:33:33.988000 audit[2212]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.988000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9dbb96c0 a2=0 a3=7ffe9dbb96ac items=0 ppid=2186 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:33.989921 kubelet[2186]: W1213 14:33:33.989883 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.989921 kubelet[2186]: E1213 14:33:33.989916 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:33.990000 audit[2213]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:33.990000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf704d100 a2=0 a3=7ffcf704d0ec items=0 ppid=2186 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:33.990000 audit[2214]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.990000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2302c570 a2=0 a3=7ffc2302c55c items=0 ppid=2186 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:33.992000 audit[2215]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:33.992000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd480b7400 a2=0 a3=7ffd480b73ec items=0 ppid=2186 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:33.992000 audit[2216]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:33.992000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe656f2860 a2=0 a3=7ffe656f284c items=0 ppid=2186 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:33.993000 audit[2217]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:33.993000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd01c68e80 a2=0 a3=7ffd01c68e6c items=0 ppid=2186 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:34.086342 kubelet[2186]: E1213 14:33:34.086220 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="400ms" Dec 13 14:33:34.089641 kubelet[2186]: I1213 14:33:34.089609 2186 topology_manager.go:215] "Topology Admit Handler" podUID="ad18f8cf13cc4b88f8c31797948c1a74" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.091378 kubelet[2186]: I1213 14:33:34.091355 2186 topology_manager.go:215] "Topology Admit Handler" podUID="ccb4f65e1516f43c0af292a2d785bd65" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.092882 kubelet[2186]: I1213 14:33:34.092866 2186 topology_manager.go:215] "Topology Admit Handler" podUID="b602c2967ecbb7c9d22a5301b3d50388" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.098711 systemd[1]: Created slice kubepods-burstable-podad18f8cf13cc4b88f8c31797948c1a74.slice. Dec 13 14:33:34.107155 systemd[1]: Created slice kubepods-burstable-podb602c2967ecbb7c9d22a5301b3d50388.slice. Dec 13 14:33:34.117058 systemd[1]: Created slice kubepods-burstable-podccb4f65e1516f43c0af292a2d785bd65.slice. Dec 13 14:33:34.186658 kubelet[2186]: I1213 14:33:34.186539 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187053 kubelet[2186]: I1213 14:33:34.187022 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187241 kubelet[2186]: I1213 14:33:34.187216 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ccb4f65e1516f43c0af292a2d785bd65-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-1c166c7881\" (UID: \"ccb4f65e1516f43c0af292a2d785bd65\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187501 kubelet[2186]: I1213 14:33:34.187478 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187592 kubelet[2186]: I1213 14:33:34.187560 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187650 kubelet[2186]: I1213 14:33:34.187620 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187717 kubelet[2186]: I1213 14:33:34.187676 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187807 kubelet[2186]: I1213 14:33:34.187764 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.187923 kubelet[2186]: I1213 14:33:34.187875 2186 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.188884 kubelet[2186]: I1213 14:33:34.188848 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.189386 kubelet[2186]: E1213 14:33:34.189355 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.406136 env[1409]: time="2024-12-13T14:33:34.405996605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-1c166c7881,Uid:ad18f8cf13cc4b88f8c31797948c1a74,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:34.416542 env[1409]: time="2024-12-13T14:33:34.416505989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-1c166c7881,Uid:b602c2967ecbb7c9d22a5301b3d50388,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:34.420210 env[1409]: time="2024-12-13T14:33:34.420171218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-1c166c7881,Uid:ccb4f65e1516f43c0af292a2d785bd65,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:34.486966 kubelet[2186]: E1213 14:33:34.486934 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="800ms" Dec 13 14:33:34.591218 kubelet[2186]: I1213 14:33:34.591182 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:34.591567 kubelet[2186]: E1213 14:33:34.591544 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:35.128315 kubelet[2186]: W1213 14:33:35.128251 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.128315 kubelet[2186]: E1213 14:33:35.128322 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.265544 kubelet[2186]: W1213 14:33:35.265463 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.265544 kubelet[2186]: E1213 14:33:35.265546 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.282015 kubelet[2186]: W1213 14:33:35.281979 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.282015 kubelet[2186]: E1213 14:33:35.282020 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.287619 kubelet[2186]: E1213 14:33:35.287586 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="1.6s" Dec 13 14:33:35.334297 kubelet[2186]: W1213 14:33:35.334250 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.334297 kubelet[2186]: E1213 14:33:35.334295 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.394242 kubelet[2186]: I1213 14:33:35.393606 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:35.394242 kubelet[2186]: E1213 14:33:35.394202 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:35.481142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3989929146.mount: Deactivated successfully. Dec 13 14:33:35.771598 env[1409]: time="2024-12-13T14:33:35.771451955Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.829850 env[1409]: time="2024-12-13T14:33:35.829775109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.867715 env[1409]: time="2024-12-13T14:33:35.867655305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.871586 env[1409]: time="2024-12-13T14:33:35.871540735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.901927 kubelet[2186]: E1213 14:33:35.901887 2186 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:35.976041 env[1409]: time="2024-12-13T14:33:35.975976349Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.020238 env[1409]: time="2024-12-13T14:33:36.020180091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.023712 env[1409]: time="2024-12-13T14:33:36.023102214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.069474 env[1409]: time="2024-12-13T14:33:36.069419867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.074646 env[1409]: time="2024-12-13T14:33:36.074606707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.889275 kubelet[2186]: E1213 14:33:36.888934 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="3.2s" Dec 13 14:33:36.996148 kubelet[2186]: I1213 14:33:36.996109 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:36.996628 kubelet[2186]: E1213 14:33:36.996549 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:37.286230 kubelet[2186]: W1213 14:33:37.286093 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:37.286230 kubelet[2186]: E1213 14:33:37.286155 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:37.740082 kubelet[2186]: W1213 14:33:37.740019 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:37.740082 kubelet[2186]: E1213 14:33:37.740085 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:38.006969 kubelet[2186]: W1213 14:33:38.006857 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:38.006969 kubelet[2186]: E1213 14:33:38.006903 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:38.126496 kubelet[2186]: W1213 14:33:38.126428 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:38.126496 kubelet[2186]: E1213 14:33:38.126501 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:38.169594 env[1409]: time="2024-12-13T14:33:38.169531490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.132449 env[1409]: time="2024-12-13T14:33:39.132377522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.330304 env[1409]: time="2024-12-13T14:33:39.330244142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:39.739940 env[1409]: time="2024-12-13T14:33:39.739873980Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:39.740422 env[1409]: time="2024-12-13T14:33:39.739913781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:39.740422 env[1409]: time="2024-12-13T14:33:39.739927081Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:39.740422 env[1409]: time="2024-12-13T14:33:39.740163582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2952bb117e34650230f9de66760f74373418842fc97b062bee94b5a052b2d3f pid=2225 runtime=io.containerd.runc.v2 Dec 13 14:33:39.761333 systemd[1]: Started cri-containerd-c2952bb117e34650230f9de66760f74373418842fc97b062bee94b5a052b2d3f.scope. Dec 13 14:33:39.783733 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 14:33:39.793489 kernel: audit: type=1400 audit(1734100419.775:451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.793552 kernel: audit: type=1400 audit(1734100419.775:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.831346 kernel: audit: type=1400 audit(1734100419.776:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.831437 kernel: audit: type=1400 audit(1734100419.776:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.844230 kernel: audit: type=1400 audit(1734100419.776:455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.856123 kernel: audit: type=1400 audit(1734100419.776:456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.868967 kernel: audit: type=1400 audit(1734100419.776:457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.882736 kernel: audit: type=1400 audit(1734100419.776:458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.898217 env[1409]: time="2024-12-13T14:33:39.898165116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:39.898367 env[1409]: time="2024-12-13T14:33:39.898346317Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:39.898445 env[1409]: time="2024-12-13T14:33:39.898428118Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:39.898742 env[1409]: time="2024-12-13T14:33:39.898702320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0681b0a86b9dcecc495a4f1d7b73639e6da7bd6d90c8cf2445639a35764492e3 pid=2260 runtime=io.containerd.runc.v2 Dec 13 14:33:39.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.914026 env[1409]: time="2024-12-13T14:33:39.913986729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-1c166c7881,Uid:ad18f8cf13cc4b88f8c31797948c1a74,Namespace:kube-system,Attempt:0,} returns sandbox id \"c2952bb117e34650230f9de66760f74373418842fc97b062bee94b5a052b2d3f\"" Dec 13 14:33:39.916811 kernel: audit: type=1400 audit(1734100419.776:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.918983 kernel: audit: type=1400 audit(1734100419.776:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.776000 audit: BPF prog-id=56 op=LOAD Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393532626231313765333436353032333066396465363637363066 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393532626231313765333436353032333066396465363637363066 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.780000 audit: BPF prog-id=57 op=LOAD Dec 13 14:33:39.780000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024d80 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393532626231313765333436353032333066396465363637363066 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit: BPF prog-id=58 op=LOAD Dec 13 14:33:39.806000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024dc8 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393532626231313765333436353032333066396465363637363066 Dec 13 14:33:39.806000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:33:39.806000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.806000 audit: BPF prog-id=59 op=LOAD Dec 13 14:33:39.806000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000251d8 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332393532626231313765333436353032333066396465363637363066 Dec 13 14:33:39.926925 env[1409]: time="2024-12-13T14:33:39.926886022Z" level=info msg="CreateContainer within sandbox \"c2952bb117e34650230f9de66760f74373418842fc97b062bee94b5a052b2d3f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:33:39.934262 systemd[1]: Started cri-containerd-0681b0a86b9dcecc495a4f1d7b73639e6da7bd6d90c8cf2445639a35764492e3.scope. Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit: BPF prog-id=60 op=LOAD Dec 13 14:33:39.943000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2260 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383162306138366239646365636334393561346631643762373336 Dec 13 14:33:39.943000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.943000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2260 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383162306138366239646365636334393561346631643762373336 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit: BPF prog-id=61 op=LOAD Dec 13 14:33:39.944000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9f20 items=0 ppid=2260 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383162306138366239646365636334393561346631643762373336 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit: BPF prog-id=62 op=LOAD Dec 13 14:33:39.944000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9f68 items=0 ppid=2260 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383162306138366239646365636334393561346631643762373336 Dec 13 14:33:39.944000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:33:39.944000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:39.944000 audit: BPF prog-id=63 op=LOAD Dec 13 14:33:39.944000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000310378 items=0 ppid=2260 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:39.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036383162306138366239646365636334393561346631643762373336 Dec 13 14:33:39.972064 env[1409]: time="2024-12-13T14:33:39.972023346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-1c166c7881,Uid:ccb4f65e1516f43c0af292a2d785bd65,Namespace:kube-system,Attempt:0,} returns sandbox id \"0681b0a86b9dcecc495a4f1d7b73639e6da7bd6d90c8cf2445639a35764492e3\"" Dec 13 14:33:39.974453 env[1409]: time="2024-12-13T14:33:39.974418563Z" level=info msg="CreateContainer within sandbox \"0681b0a86b9dcecc495a4f1d7b73639e6da7bd6d90c8cf2445639a35764492e3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:33:40.001961 kubelet[2186]: E1213 14:33:40.001837 2186 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:40.090213 kubelet[2186]: E1213 14:33:40.090172 2186 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1c166c7881?timeout=10s\": dial tcp 10.200.8.37:6443: connect: connection refused" interval="6.4s" Dec 13 14:33:40.198869 kubelet[2186]: I1213 14:33:40.198835 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:40.199237 kubelet[2186]: E1213 14:33:40.199213 2186 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:40.238646 env[1409]: time="2024-12-13T14:33:40.238573224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:40.238884 env[1409]: time="2024-12-13T14:33:40.238615924Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:40.238884 env[1409]: time="2024-12-13T14:33:40.238629624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:40.238884 env[1409]: time="2024-12-13T14:33:40.238768825Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40a83b65d037cc8868a6c8f0ea4199ba7f8aaff447fb5380727e27331e8998f8 pid=2307 runtime=io.containerd.runc.v2 Dec 13 14:33:40.251310 systemd[1]: Started cri-containerd-40a83b65d037cc8868a6c8f0ea4199ba7f8aaff447fb5380727e27331e8998f8.scope. Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit: BPF prog-id=64 op=LOAD Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2307 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613833623635643033376363383836386136633866306561343139 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2307 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613833623635643033376363383836386136633866306561343139 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit: BPF prog-id=65 op=LOAD Dec 13 14:33:40.263000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000328910 items=0 ppid=2307 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613833623635643033376363383836386136633866306561343139 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.263000 audit: BPF prog-id=66 op=LOAD Dec 13 14:33:40.263000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000328958 items=0 ppid=2307 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613833623635643033376363383836386136633866306561343139 Dec 13 14:33:40.263000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:33:40.263000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.264000 audit: BPF prog-id=67 op=LOAD Dec 13 14:33:40.264000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000328d68 items=0 ppid=2307 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613833623635643033376363383836386136633866306561343139 Dec 13 14:33:40.292494 env[1409]: time="2024-12-13T14:33:40.292452603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-1c166c7881,Uid:b602c2967ecbb7c9d22a5301b3d50388,Namespace:kube-system,Attempt:0,} returns sandbox id \"40a83b65d037cc8868a6c8f0ea4199ba7f8aaff447fb5380727e27331e8998f8\"" Dec 13 14:33:40.325627 env[1409]: time="2024-12-13T14:33:40.325578835Z" level=info msg="CreateContainer within sandbox \"40a83b65d037cc8868a6c8f0ea4199ba7f8aaff447fb5380727e27331e8998f8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:33:40.820587 env[1409]: time="2024-12-13T14:33:40.820514615Z" level=info msg="CreateContainer within sandbox \"c2952bb117e34650230f9de66760f74373418842fc97b062bee94b5a052b2d3f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"9890294ae6308d5ff00fadb97c320fe1ef140a92eff3017c31b9867e5d17ef07\"" Dec 13 14:33:40.821632 env[1409]: time="2024-12-13T14:33:40.821587322Z" level=info msg="StartContainer for \"9890294ae6308d5ff00fadb97c320fe1ef140a92eff3017c31b9867e5d17ef07\"" Dec 13 14:33:40.843116 systemd[1]: Started cri-containerd-9890294ae6308d5ff00fadb97c320fe1ef140a92eff3017c31b9867e5d17ef07.scope. Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit: BPF prog-id=68 op=LOAD Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2225 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393032393461653633303864356666303066616462393763333230 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2225 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393032393461653633303864356666303066616462393763333230 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit: BPF prog-id=69 op=LOAD Dec 13 14:33:40.861000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003be980 items=0 ppid=2225 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393032393461653633303864356666303066616462393763333230 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit: BPF prog-id=70 op=LOAD Dec 13 14:33:40.861000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003be9c8 items=0 ppid=2225 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393032393461653633303864356666303066616462393763333230 Dec 13 14:33:40.861000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:33:40.861000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:40.861000 audit: BPF prog-id=71 op=LOAD Dec 13 14:33:40.861000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003bedd8 items=0 ppid=2225 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:40.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393032393461653633303864356666303066616462393763333230 Dec 13 14:33:40.972975 env[1409]: time="2024-12-13T14:33:40.972917186Z" level=info msg="StartContainer for \"9890294ae6308d5ff00fadb97c320fe1ef140a92eff3017c31b9867e5d17ef07\" returns successfully" Dec 13 14:33:41.023351 env[1409]: time="2024-12-13T14:33:41.023289637Z" level=info msg="CreateContainer within sandbox \"0681b0a86b9dcecc495a4f1d7b73639e6da7bd6d90c8cf2445639a35764492e3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"357135e1ddce878aedb729365ab54a9617dc08e309f821400301426677c8f1a7\"" Dec 13 14:33:41.023886 env[1409]: time="2024-12-13T14:33:41.023855741Z" level=info msg="StartContainer for \"357135e1ddce878aedb729365ab54a9617dc08e309f821400301426677c8f1a7\"" Dec 13 14:33:41.043621 systemd[1]: Started cri-containerd-357135e1ddce878aedb729365ab54a9617dc08e309f821400301426677c8f1a7.scope. Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit: BPF prog-id=72 op=LOAD Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2260 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373133356531646463653837386165646237323933363561623534 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2260 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373133356531646463653837386165646237323933363561623534 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit: BPF prog-id=73 op=LOAD Dec 13 14:33:41.063000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000384100 items=0 ppid=2260 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373133356531646463653837386165646237323933363561623534 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.063000 audit: BPF prog-id=74 op=LOAD Dec 13 14:33:41.063000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000384148 items=0 ppid=2260 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373133356531646463653837386165646237323933363561623534 Dec 13 14:33:41.064000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:33:41.064000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.064000 audit: BPF prog-id=75 op=LOAD Dec 13 14:33:41.064000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000384558 items=0 ppid=2260 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373133356531646463653837386165646237323933363561623534 Dec 13 14:33:41.075724 env[1409]: time="2024-12-13T14:33:41.075630598Z" level=info msg="CreateContainer within sandbox \"40a83b65d037cc8868a6c8f0ea4199ba7f8aaff447fb5380727e27331e8998f8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d12b3749de651eccf523c1227609d7b6914607f164a1c70f703224326da8109f\"" Dec 13 14:33:41.077785 env[1409]: time="2024-12-13T14:33:41.076508504Z" level=info msg="StartContainer for \"d12b3749de651eccf523c1227609d7b6914607f164a1c70f703224326da8109f\"" Dec 13 14:33:41.101730 systemd[1]: Started cri-containerd-d12b3749de651eccf523c1227609d7b6914607f164a1c70f703224326da8109f.scope. Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.134000 audit: BPF prog-id=76 op=LOAD Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2307 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431326233373439646536353165636366353233633132323736303964 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2307 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431326233373439646536353165636366353233633132323736303964 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit: BPF prog-id=77 op=LOAD Dec 13 14:33:41.135000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388370 items=0 ppid=2307 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431326233373439646536353165636366353233633132323736303964 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit: BPF prog-id=78 op=LOAD Dec 13 14:33:41.135000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003883b8 items=0 ppid=2307 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431326233373439646536353165636366353233633132323736303964 Dec 13 14:33:41.135000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:33:41.135000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.135000 audit: BPF prog-id=79 op=LOAD Dec 13 14:33:41.135000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003887c8 items=0 ppid=2307 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431326233373439646536353165636366353233633132323736303964 Dec 13 14:33:41.138862 env[1409]: time="2024-12-13T14:33:41.138775033Z" level=info msg="StartContainer for \"357135e1ddce878aedb729365ab54a9617dc08e309f821400301426677c8f1a7\" returns successfully" Dec 13 14:33:41.190376 env[1409]: time="2024-12-13T14:33:41.190328588Z" level=info msg="StartContainer for \"d12b3749de651eccf523c1227609d7b6914607f164a1c70f703224326da8109f\" returns successfully" Dec 13 14:33:41.274966 kubelet[2186]: W1213 14:33:41.274848 2186 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:41.274966 kubelet[2186]: E1213 14:33:41.274939 2186 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1c166c7881&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Dec 13 14:33:41.736350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1311049757.mount: Deactivated successfully. Dec 13 14:33:42.263000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:42.264000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:42.263000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a55050 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:42.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:42.264000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005b1ba0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:42.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:43.066000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.066000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005c0dbf0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.066000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.067000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.067000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0087f6dc0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.067000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.068000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.068000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c006b24870 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.068000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.070000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.070000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c006b24cc0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.070000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.092000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.092000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00400e280 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.092000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.098000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:43.098000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006c96c00 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:33:43.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:33:43.526882 kubelet[2186]: E1213 14:33:43.526722 2186 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.6-a-1c166c7881" not found Dec 13 14:33:43.890885 kubelet[2186]: E1213 14:33:43.890847 2186 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.6-a-1c166c7881" not found Dec 13 14:33:43.959659 kubelet[2186]: E1213 14:33:43.959615 2186 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:44.322051 kubelet[2186]: E1213 14:33:44.322019 2186 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.6-a-1c166c7881" not found Dec 13 14:33:45.219597 kubelet[2186]: E1213 14:33:45.219559 2186 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.6-a-1c166c7881" not found Dec 13 14:33:46.493685 kubelet[2186]: E1213 14:33:46.493640 2186 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-1c166c7881\" not found" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:46.601670 kubelet[2186]: I1213 14:33:46.601636 2186 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:46.610122 kubelet[2186]: I1213 14:33:46.610092 2186 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:46.617903 kubelet[2186]: E1213 14:33:46.617877 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:46.718242 kubelet[2186]: E1213 14:33:46.718194 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:46.818749 kubelet[2186]: E1213 14:33:46.818700 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:46.853000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.858378 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:33:46.858469 kernel: audit: type=1400 audit(1734100426.853:567): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.889434 kernel: audit: type=1400 audit(1734100426.854:568): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.854000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.854000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c815c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.910113 kernel: audit: type=1300 audit(1734100426.854:568): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c815c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.910230 kernel: audit: type=1327 audit(1734100426.854:568): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:46.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:46.919616 kubelet[2186]: E1213 14:33:46.919586 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:46.854000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.942824 kernel: audit: type=1400 audit(1734100426.854:569): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.942948 kernel: audit: type=1300 audit(1734100426.854:569): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c81600 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.854000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c81600 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:46.981217 kernel: audit: type=1327 audit(1734100426.854:569): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:46.981353 kernel: audit: type=1400 audit(1734100426.854:570): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:46.854000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:47.015981 kernel: audit: type=1300 audit(1734100426.854:570): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c81640 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.854000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c81640 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:47.016835 kernel: audit: type=1327 audit(1734100426.854:570): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:47.020686 kubelet[2186]: E1213 14:33:47.020660 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:46.853000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c2c920 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:46.853000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:47.121748 kubelet[2186]: E1213 14:33:47.121630 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.222208 kubelet[2186]: E1213 14:33:47.222169 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.322743 kubelet[2186]: E1213 14:33:47.322705 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.423430 kubelet[2186]: E1213 14:33:47.423326 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.480786 systemd[1]: Reloading. Dec 13 14:33:47.524561 kubelet[2186]: E1213 14:33:47.524530 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.580390 /usr/lib/systemd/system-generators/torcx-generator[2478]: time="2024-12-13T14:33:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:47.580427 /usr/lib/systemd/system-generators/torcx-generator[2478]: time="2024-12-13T14:33:47Z" level=info msg="torcx already run" Dec 13 14:33:47.626106 kubelet[2186]: E1213 14:33:47.626065 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.661733 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:47.661753 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:47.679452 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:47.727008 kubelet[2186]: E1213 14:33:47.726961 2186 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-1c166c7881\" not found" Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit: BPF prog-id=80 op=LOAD Dec 13 14:33:47.761000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.762000 audit: BPF prog-id=81 op=LOAD Dec 13 14:33:47.762000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit: BPF prog-id=82 op=LOAD Dec 13 14:33:47.765000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit: BPF prog-id=83 op=LOAD Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.765000 audit: BPF prog-id=84 op=LOAD Dec 13 14:33:47.765000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:33:47.765000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit: BPF prog-id=85 op=LOAD Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.766000 audit: BPF prog-id=86 op=LOAD Dec 13 14:33:47.766000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:33:47.766000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:33:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.767000 audit: BPF prog-id=87 op=LOAD Dec 13 14:33:47.767000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit: BPF prog-id=88 op=LOAD Dec 13 14:33:47.768000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit: BPF prog-id=89 op=LOAD Dec 13 14:33:47.769000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.769000 audit: BPF prog-id=90 op=LOAD Dec 13 14:33:47.769000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit: BPF prog-id=91 op=LOAD Dec 13 14:33:47.771000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit: BPF prog-id=92 op=LOAD Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.771000 audit: BPF prog-id=93 op=LOAD Dec 13 14:33:47.771000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:33:47.771000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.773000 audit: BPF prog-id=94 op=LOAD Dec 13 14:33:47.773000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.774000 audit: BPF prog-id=95 op=LOAD Dec 13 14:33:47.774000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.776000 audit: BPF prog-id=96 op=LOAD Dec 13 14:33:47.776000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.777000 audit: BPF prog-id=97 op=LOAD Dec 13 14:33:47.777000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit: BPF prog-id=98 op=LOAD Dec 13 14:33:47.779000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit: BPF prog-id=99 op=LOAD Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:47.780000 audit: BPF prog-id=100 op=LOAD Dec 13 14:33:47.780000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:33:47.780000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:33:47.797163 systemd[1]: Stopping kubelet.service... Dec 13 14:33:47.798039 kubelet[2186]: I1213 14:33:47.797489 2186 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:47.816254 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:33:47.816479 systemd[1]: Stopped kubelet.service. Dec 13 14:33:47.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:47.818691 systemd[1]: Starting kubelet.service... Dec 13 14:33:47.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:47.901774 systemd[1]: Started kubelet.service. Dec 13 14:33:47.983846 kubelet[2545]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:47.984356 kubelet[2545]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:33:47.984430 kubelet[2545]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:47.984605 kubelet[2545]: I1213 14:33:47.984568 2545 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:33:47.990689 kubelet[2545]: I1213 14:33:47.990653 2545 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:33:47.990689 kubelet[2545]: I1213 14:33:47.990684 2545 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:33:47.990991 kubelet[2545]: I1213 14:33:47.990970 2545 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:33:47.994777 kubelet[2545]: I1213 14:33:47.994748 2545 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:33:47.997935 kubelet[2545]: I1213 14:33:47.997913 2545 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:48.015952 kubelet[2545]: I1213 14:33:48.015266 2545 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:33:48.015952 kubelet[2545]: I1213 14:33:48.015593 2545 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:33:48.015952 kubelet[2545]: I1213 14:33:48.015928 2545 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016019 2545 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016035 2545 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016099 2545 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016203 2545 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016219 2545 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016250 2545 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:33:48.016309 kubelet[2545]: I1213 14:33:48.016269 2545 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:33:48.020612 kubelet[2545]: I1213 14:33:48.018120 2545 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:33:48.020612 kubelet[2545]: I1213 14:33:48.018384 2545 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:33:48.020612 kubelet[2545]: I1213 14:33:48.018936 2545 server.go:1256] "Started kubelet" Dec 13 14:33:48.020000 audit[2545]: AVC avc: denied { mac_admin } for pid=2545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.020000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:48.020000 audit[2545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00073e8a0 a1=c0009a17e8 a2=c00073e870 a3=25 items=0 ppid=1 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:48.020000 audit[2545]: AVC avc: denied { mac_admin } for pid=2545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.020000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:48.020000 audit[2545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000164440 a1=c0009a1800 a2=c00073e930 a3=25 items=0 ppid=1 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:48.024172 kubelet[2545]: I1213 14:33:48.021699 2545 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:33:48.024172 kubelet[2545]: I1213 14:33:48.021765 2545 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:33:48.024172 kubelet[2545]: I1213 14:33:48.021825 2545 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:33:48.032128 kubelet[2545]: I1213 14:33:48.032095 2545 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:33:48.033770 kubelet[2545]: I1213 14:33:48.033747 2545 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:33:48.035055 kubelet[2545]: I1213 14:33:48.035035 2545 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:33:48.035226 kubelet[2545]: I1213 14:33:48.035211 2545 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:33:48.037321 kubelet[2545]: I1213 14:33:48.037303 2545 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.039292 2545 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.039439 2545 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.041224 2545 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.042402 2545 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.042427 2545 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:33:48.042614 kubelet[2545]: I1213 14:33:48.042444 2545 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:33:48.042614 kubelet[2545]: E1213 14:33:48.042552 2545 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:33:48.053677 kubelet[2545]: I1213 14:33:48.053647 2545 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:33:48.053789 kubelet[2545]: I1213 14:33:48.053738 2545 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:33:48.061993 kubelet[2545]: E1213 14:33:48.059856 2545 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:33:48.061993 kubelet[2545]: I1213 14:33:48.060157 2545 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:33:48.111051 kubelet[2545]: I1213 14:33:48.110964 2545 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:33:48.111218 kubelet[2545]: I1213 14:33:48.111210 2545 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:33:48.111294 kubelet[2545]: I1213 14:33:48.111287 2545 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:48.111482 kubelet[2545]: I1213 14:33:48.111469 2545 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:33:48.111567 kubelet[2545]: I1213 14:33:48.111560 2545 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:33:48.111608 kubelet[2545]: I1213 14:33:48.111603 2545 policy_none.go:49] "None policy: Start" Dec 13 14:33:48.112226 kubelet[2545]: I1213 14:33:48.112209 2545 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:33:48.112394 kubelet[2545]: I1213 14:33:48.112379 2545 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:33:48.112586 kubelet[2545]: I1213 14:33:48.112578 2545 state_mem.go:75] "Updated machine memory state" Dec 13 14:33:48.118002 kubelet[2545]: I1213 14:33:48.117967 2545 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:33:48.117000 audit[2545]: AVC avc: denied { mac_admin } for pid=2545 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.117000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:48.117000 audit[2545]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5ad50 a1=c001012228 a2=c000b5ad20 a3=25 items=0 ppid=1 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:48.118856 kubelet[2545]: I1213 14:33:48.118838 2545 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:33:48.119195 kubelet[2545]: I1213 14:33:48.119180 2545 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:33:48.140023 kubelet[2545]: I1213 14:33:48.139998 2545 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.143524 kubelet[2545]: I1213 14:33:48.143496 2545 topology_manager.go:215] "Topology Admit Handler" podUID="b602c2967ecbb7c9d22a5301b3d50388" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.143654 kubelet[2545]: I1213 14:33:48.143614 2545 topology_manager.go:215] "Topology Admit Handler" podUID="ad18f8cf13cc4b88f8c31797948c1a74" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.143710 kubelet[2545]: I1213 14:33:48.143663 2545 topology_manager.go:215] "Topology Admit Handler" podUID="ccb4f65e1516f43c0af292a2d785bd65" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.154108 kubelet[2545]: W1213 14:33:48.153883 2545 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:33:48.424744 kubelet[2545]: I1213 14:33:48.424709 2545 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.425046 kubelet[2545]: I1213 14:33:48.425027 2545 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.425199 kubelet[2545]: W1213 14:33:48.425052 2545 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:33:48.431007 kubelet[2545]: W1213 14:33:48.430983 2545 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:33:48.524595 kubelet[2545]: I1213 14:33:48.524549 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.524876 kubelet[2545]: I1213 14:33:48.524609 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.524876 kubelet[2545]: I1213 14:33:48.524643 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.524876 kubelet[2545]: I1213 14:33:48.524686 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.524876 kubelet[2545]: I1213 14:33:48.524726 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.524876 kubelet[2545]: I1213 14:33:48.524757 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ccb4f65e1516f43c0af292a2d785bd65-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-1c166c7881\" (UID: \"ccb4f65e1516f43c0af292a2d785bd65\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.525142 kubelet[2545]: I1213 14:33:48.524788 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.525142 kubelet[2545]: I1213 14:33:48.524839 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ad18f8cf13cc4b88f8c31797948c1a74-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1c166c7881\" (UID: \"ad18f8cf13cc4b88f8c31797948c1a74\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:48.525142 kubelet[2545]: I1213 14:33:48.524870 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b602c2967ecbb7c9d22a5301b3d50388-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" (UID: \"b602c2967ecbb7c9d22a5301b3d50388\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:49.017417 kubelet[2545]: I1213 14:33:49.017369 2545 apiserver.go:52] "Watching apiserver" Dec 13 14:33:49.017000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:33:49.017000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009f1200 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:33:49.017000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:49.040193 kubelet[2545]: I1213 14:33:49.040159 2545 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:33:49.106848 kubelet[2545]: W1213 14:33:49.106819 2545 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:33:49.107089 kubelet[2545]: E1213 14:33:49.107074 2545 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-1c166c7881\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" Dec 13 14:33:49.119337 kubelet[2545]: I1213 14:33:49.119300 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-1c166c7881" podStartSLOduration=1.119210548 podStartE2EDuration="1.119210548s" podCreationTimestamp="2024-12-13 14:33:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:49.118978647 +0000 UTC m=+1.211144499" watchObservedRunningTime="2024-12-13 14:33:49.119210548 +0000 UTC m=+1.211376300" Dec 13 14:33:49.138966 kubelet[2545]: I1213 14:33:49.138906 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-1c166c7881" podStartSLOduration=1.138860165 podStartE2EDuration="1.138860165s" podCreationTimestamp="2024-12-13 14:33:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:49.130292014 +0000 UTC m=+1.222457866" watchObservedRunningTime="2024-12-13 14:33:49.138860165 +0000 UTC m=+1.231026017" Dec 13 14:33:56.570226 sudo[1834]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:56.569000 audit[1834]: USER_END pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.575187 kernel: kauditd_printk_skb: 263 callbacks suppressed Dec 13 14:33:56.575289 kernel: audit: type=1106 audit(1734100436.569:821): pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.573000 audit[1834]: CRED_DISP pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.604729 kernel: audit: type=1104 audit(1734100436.573:822): pid=1834 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.688948 sshd[1831]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:56.689000 audit[1831]: USER_END pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:56.692185 systemd[1]: sshd@6-10.200.8.37:22-10.200.16.10:47964.service: Deactivated successfully. Dec 13 14:33:56.693074 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:33:56.693211 systemd[1]: session-9.scope: Consumed 4.258s CPU time. Dec 13 14:33:56.694558 systemd-logind[1399]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:33:56.695584 systemd-logind[1399]: Removed session 9. Dec 13 14:33:56.709030 kernel: audit: type=1106 audit(1734100436.689:823): pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:56.709208 kernel: audit: type=1104 audit(1734100436.689:824): pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:56.689000 audit[1831]: CRED_DISP pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:33:56.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.16.10:47964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.740221 kernel: audit: type=1131 audit(1734100436.689:825): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.16.10:47964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:56.863684 kubelet[2545]: I1213 14:33:56.863559 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1c166c7881" podStartSLOduration=8.863514624 podStartE2EDuration="8.863514624s" podCreationTimestamp="2024-12-13 14:33:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:49.139203767 +0000 UTC m=+1.231369519" watchObservedRunningTime="2024-12-13 14:33:56.863514624 +0000 UTC m=+8.955680376" Dec 13 14:33:59.961827 kubelet[2545]: I1213 14:33:59.961801 2545 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:33:59.962864 env[1409]: time="2024-12-13T14:33:59.962744013Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:33:59.963374 kubelet[2545]: I1213 14:33:59.963350 2545 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:34:00.842527 kubelet[2545]: I1213 14:34:00.842481 2545 topology_manager.go:215] "Topology Admit Handler" podUID="79884147-6b7b-4de7-b5fe-1f86b25f5a07" podNamespace="kube-system" podName="kube-proxy-9xsgn" Dec 13 14:34:00.861101 systemd[1]: Created slice kubepods-besteffort-pod79884147_6b7b_4de7_b5fe_1f86b25f5a07.slice. Dec 13 14:34:00.973947 kubelet[2545]: I1213 14:34:00.973902 2545 topology_manager.go:215] "Topology Admit Handler" podUID="a370eff2-d4d3-4bc9-9521-b025703075b8" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-wzz84" Dec 13 14:34:00.980352 systemd[1]: Created slice kubepods-besteffort-poda370eff2_d4d3_4bc9_9521_b025703075b8.slice. Dec 13 14:34:01.001330 kubelet[2545]: I1213 14:34:01.001300 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79884147-6b7b-4de7-b5fe-1f86b25f5a07-lib-modules\") pod \"kube-proxy-9xsgn\" (UID: \"79884147-6b7b-4de7-b5fe-1f86b25f5a07\") " pod="kube-system/kube-proxy-9xsgn" Dec 13 14:34:01.001500 kubelet[2545]: I1213 14:34:01.001342 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/79884147-6b7b-4de7-b5fe-1f86b25f5a07-kube-proxy\") pod \"kube-proxy-9xsgn\" (UID: \"79884147-6b7b-4de7-b5fe-1f86b25f5a07\") " pod="kube-system/kube-proxy-9xsgn" Dec 13 14:34:01.001500 kubelet[2545]: I1213 14:34:01.001373 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79884147-6b7b-4de7-b5fe-1f86b25f5a07-xtables-lock\") pod \"kube-proxy-9xsgn\" (UID: \"79884147-6b7b-4de7-b5fe-1f86b25f5a07\") " pod="kube-system/kube-proxy-9xsgn" Dec 13 14:34:01.001500 kubelet[2545]: I1213 14:34:01.001400 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v8mcq\" (UniqueName: \"kubernetes.io/projected/79884147-6b7b-4de7-b5fe-1f86b25f5a07-kube-api-access-v8mcq\") pod \"kube-proxy-9xsgn\" (UID: \"79884147-6b7b-4de7-b5fe-1f86b25f5a07\") " pod="kube-system/kube-proxy-9xsgn" Dec 13 14:34:01.101723 kubelet[2545]: I1213 14:34:01.101598 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a370eff2-d4d3-4bc9-9521-b025703075b8-var-lib-calico\") pod \"tigera-operator-c7ccbd65-wzz84\" (UID: \"a370eff2-d4d3-4bc9-9521-b025703075b8\") " pod="tigera-operator/tigera-operator-c7ccbd65-wzz84" Dec 13 14:34:01.102039 kubelet[2545]: I1213 14:34:01.101996 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvvb6\" (UniqueName: \"kubernetes.io/projected/a370eff2-d4d3-4bc9-9521-b025703075b8-kube-api-access-tvvb6\") pod \"tigera-operator-c7ccbd65-wzz84\" (UID: \"a370eff2-d4d3-4bc9-9521-b025703075b8\") " pod="tigera-operator/tigera-operator-c7ccbd65-wzz84" Dec 13 14:34:01.172256 env[1409]: time="2024-12-13T14:34:01.172191966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9xsgn,Uid:79884147-6b7b-4de7-b5fe-1f86b25f5a07,Namespace:kube-system,Attempt:0,}" Dec 13 14:34:01.223250 env[1409]: time="2024-12-13T14:34:01.222272709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:01.223250 env[1409]: time="2024-12-13T14:34:01.222311010Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:01.223250 env[1409]: time="2024-12-13T14:34:01.222325310Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:01.223250 env[1409]: time="2024-12-13T14:34:01.222542911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f43622fd97e671b5c6b6bddf3b767c4d2a321db8f87e56e1ac1c3b3c44790b01 pid=2625 runtime=io.containerd.runc.v2 Dec 13 14:34:01.254210 systemd[1]: Started cri-containerd-f43622fd97e671b5c6b6bddf3b767c4d2a321db8f87e56e1ac1c3b3c44790b01.scope. Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278865 kernel: audit: type=1400 audit(1734100441.263:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.294018 env[1409]: time="2024-12-13T14:34:01.283578707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-wzz84,Uid:a370eff2-d4d3-4bc9-9521-b025703075b8,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:34:01.294936 kernel: audit: type=1400 audit(1734100441.263:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.295585 kernel: audit: type=1400 audit(1734100441.263:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.329166 kernel: audit: type=1400 audit(1734100441.263:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.338742 env[1409]: time="2024-12-13T14:34:01.338696075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9xsgn,Uid:79884147-6b7b-4de7-b5fe-1f86b25f5a07,Namespace:kube-system,Attempt:0,} returns sandbox id \"f43622fd97e671b5c6b6bddf3b767c4d2a321db8f87e56e1ac1c3b3c44790b01\"" Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit: BPF prog-id=101 op=LOAD Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2625 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.343852 kernel: audit: type=1400 audit(1734100441.263:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333632326664393765363731623563366236626464663362373637 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2625 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333632326664393765363731623563366236626464663362373637 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit: BPF prog-id=102 op=LOAD Dec 13 14:34:01.278000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025bc0 items=0 ppid=2625 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333632326664393765363731623563366236626464663362373637 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit: BPF prog-id=103 op=LOAD Dec 13 14:34:01.278000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025c08 items=0 ppid=2625 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333632326664393765363731623563366236626464663362373637 Dec 13 14:34:01.278000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:34:01.278000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.278000 audit: BPF prog-id=104 op=LOAD Dec 13 14:34:01.278000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00035a018 items=0 ppid=2625 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634333632326664393765363731623563366236626464663362373637 Dec 13 14:34:01.346289 env[1409]: time="2024-12-13T14:34:01.346251911Z" level=info msg="CreateContainer within sandbox \"f43622fd97e671b5c6b6bddf3b767c4d2a321db8f87e56e1ac1c3b3c44790b01\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:34:01.358314 env[1409]: time="2024-12-13T14:34:01.356140959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:01.358314 env[1409]: time="2024-12-13T14:34:01.356185760Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:01.358314 env[1409]: time="2024-12-13T14:34:01.356200360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:01.358314 env[1409]: time="2024-12-13T14:34:01.356329560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9319fe39d30c6d3214510fcbea3672e833dd24b203ef6555d57801ac658a50eb pid=2671 runtime=io.containerd.runc.v2 Dec 13 14:34:01.371139 systemd[1]: Started cri-containerd-9319fe39d30c6d3214510fcbea3672e833dd24b203ef6555d57801ac658a50eb.scope. Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.386000 audit: BPF prog-id=105 op=LOAD Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2671 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313966653339643330633664333231343531306663626561333637 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2671 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313966653339643330633664333231343531306663626561333637 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit: BPF prog-id=106 op=LOAD Dec 13 14:34:01.387000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028a510 items=0 ppid=2671 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313966653339643330633664333231343531306663626561333637 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit: BPF prog-id=107 op=LOAD Dec 13 14:34:01.387000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028a558 items=0 ppid=2671 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313966653339643330633664333231343531306663626561333637 Dec 13 14:34:01.387000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:34:01.387000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.387000 audit: BPF prog-id=108 op=LOAD Dec 13 14:34:01.387000 audit[2679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028a968 items=0 ppid=2671 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933313966653339643330633664333231343531306663626561333637 Dec 13 14:34:01.398377 env[1409]: time="2024-12-13T14:34:01.398329664Z" level=info msg="CreateContainer within sandbox \"f43622fd97e671b5c6b6bddf3b767c4d2a321db8f87e56e1ac1c3b3c44790b01\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"68c8afd502f75ce18d443348e3185f627b57a952673e3ced2bb034c6a7624502\"" Dec 13 14:34:01.400315 env[1409]: time="2024-12-13T14:34:01.399248469Z" level=info msg="StartContainer for \"68c8afd502f75ce18d443348e3185f627b57a952673e3ced2bb034c6a7624502\"" Dec 13 14:34:01.423402 systemd[1]: Started cri-containerd-68c8afd502f75ce18d443348e3185f627b57a952673e3ced2bb034c6a7624502.scope. Dec 13 14:34:01.435488 env[1409]: time="2024-12-13T14:34:01.435443145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-wzz84,Uid:a370eff2-d4d3-4bc9-9521-b025703075b8,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9319fe39d30c6d3214510fcbea3672e833dd24b203ef6555d57801ac658a50eb\"" Dec 13 14:34:01.439270 env[1409]: time="2024-12-13T14:34:01.439197263Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff50c2540a8 items=0 ppid=2625 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633861666435303266373563653138643434333334386533313835 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit: BPF prog-id=109 op=LOAD Dec 13 14:34:01.449000 audit[2702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8d68 items=0 ppid=2625 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633861666435303266373563653138643434333334386533313835 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit: BPF prog-id=110 op=LOAD Dec 13 14:34:01.449000 audit[2702]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8db8 items=0 ppid=2625 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633861666435303266373563653138643434333334386533313835 Dec 13 14:34:01.449000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:34:01.449000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.449000 audit: BPF prog-id=111 op=LOAD Dec 13 14:34:01.449000 audit[2702]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8e48 items=0 ppid=2625 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638633861666435303266373563653138643434333334386533313835 Dec 13 14:34:01.475462 env[1409]: time="2024-12-13T14:34:01.475421639Z" level=info msg="StartContainer for \"68c8afd502f75ce18d443348e3185f627b57a952673e3ced2bb034c6a7624502\" returns successfully" Dec 13 14:34:01.521000 audit[2763]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:01.521000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeca37f460 a2=0 a3=7ffeca37f44c items=0 ppid=2723 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:01.523000 audit[2764]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:01.523000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7ee96b00 a2=0 a3=7ffd7ee96aec items=0 ppid=2723 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:01.526000 audit[2765]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:01.526000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd30c3330 a2=0 a3=7ffcd30c331c items=0 ppid=2723 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:01.529000 audit[2766]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.529000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbdba5100 a2=0 a3=7ffdbdba50ec items=0 ppid=2723 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:34:01.531000 audit[2767]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.531000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd501b8840 a2=0 a3=7ffd501b882c items=0 ppid=2723 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:34:01.532000 audit[2768]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.532000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2405ccc0 a2=0 a3=7fff2405ccac items=0 ppid=2723 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:34:01.624000 audit[2769]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.642977 kernel: kauditd_printk_skb: 170 callbacks suppressed Dec 13 14:34:01.643100 kernel: audit: type=1325 audit(1734100441.624:874): table=filter:47 family=2 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.624000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5975e470 a2=0 a3=7fff5975e45c items=0 ppid=2723 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:01.678515 kernel: audit: type=1300 audit(1734100441.624:874): arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5975e470 a2=0 a3=7fff5975e45c items=0 ppid=2723 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.678610 kernel: audit: type=1327 audit(1734100441.624:874): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:01.624000 audit[2771]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.678853 kernel: audit: type=1325 audit(1734100441.624:875): table=filter:48 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.624000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff929ed480 a2=0 a3=7fff929ed46c items=0 ppid=2723 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.707330 kernel: audit: type=1300 audit(1734100441.624:875): arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff929ed480 a2=0 a3=7fff929ed46c items=0 ppid=2723 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:34:01.707884 kernel: audit: type=1327 audit(1734100441.624:875): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:34:01.630000 audit[2774]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.729085 kernel: audit: type=1325 audit(1734100441.630:876): table=filter:49 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.630000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdbd4f3c50 a2=0 a3=7ffdbd4f3c3c items=0 ppid=2723 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.766137 kernel: audit: type=1300 audit(1734100441.630:876): arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdbd4f3c50 a2=0 a3=7ffdbd4f3c3c items=0 ppid=2723 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:34:01.766817 kernel: audit: type=1327 audit(1734100441.630:876): proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:34:01.630000 audit[2775]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.793099 kernel: audit: type=1325 audit(1734100441.630:877): table=filter:50 family=2 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.630000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd28108550 a2=0 a3=7ffd2810853c items=0 ppid=2723 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:01.636000 audit[2777]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.636000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf5cd8910 a2=0 a3=7ffcf5cd88fc items=0 ppid=2723 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:01.636000 audit[2778]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.636000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9b4161f0 a2=0 a3=7ffc9b4161dc items=0 ppid=2723 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:01.636000 audit[2780]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.636000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbcd7d340 a2=0 a3=7fffbcd7d32c items=0 ppid=2723 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:01.646000 audit[2783]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.646000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbfe36df0 a2=0 a3=7fffbfe36ddc items=0 ppid=2723 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:34:01.647000 audit[2784]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.647000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd71873c0 a2=0 a3=7ffcd71873ac items=0 ppid=2723 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:01.647000 audit[2786]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.647000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccfe2ca30 a2=0 a3=7ffccfe2ca1c items=0 ppid=2723 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:01.647000 audit[2787]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.647000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffced94bf70 a2=0 a3=7ffced94bf5c items=0 ppid=2723 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:01.653000 audit[2789]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.653000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff55a330c0 a2=0 a3=7fff55a330ac items=0 ppid=2723 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:01.658000 audit[2792]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.658000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3cdc0fe0 a2=0 a3=7ffc3cdc0fcc items=0 ppid=2723 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.658000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:01.663000 audit[2795]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.663000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf70187f0 a2=0 a3=7ffdf70187dc items=0 ppid=2723 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:01.663000 audit[2796]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.663000 audit[2796]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe69be7880 a2=0 a3=7ffe69be786c items=0 ppid=2723 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:01.668000 audit[2798]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.668000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe2f378dd0 a2=0 a3=7ffe2f378dbc items=0 ppid=2723 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:01.668000 audit[2801]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.668000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4ea52bf0 a2=0 a3=7fff4ea52bdc items=0 ppid=2723 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:01.673000 audit[2802]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.673000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0d001180 a2=0 a3=7ffc0d00116c items=0 ppid=2723 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:01.796000 audit[2804]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:34:01.796000 audit[2804]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffff497ae40 a2=0 a3=7ffff497ae2c items=0 ppid=2723 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:01.981000 audit[2810]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:01.981000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdbf8fea90 a2=0 a3=7ffdbf8fea7c items=0 ppid=2723 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.002000 audit[2810]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:02.002000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdbf8fea90 a2=0 a3=7ffdbf8fea7c items=0 ppid=2723 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.005000 audit[2815]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.005000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff20808090 a2=0 a3=7fff2080807c items=0 ppid=2723 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:34:02.008000 audit[2817]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.008000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcd89cb90 a2=0 a3=7fffcd89cb7c items=0 ppid=2723 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:34:02.012000 audit[2820]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.012000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee07c01f0 a2=0 a3=7ffee07c01dc items=0 ppid=2723 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:34:02.013000 audit[2821]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.013000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39d019d0 a2=0 a3=7ffd39d019bc items=0 ppid=2723 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:34:02.016000 audit[2823]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.016000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc86fc11b0 a2=0 a3=7ffc86fc119c items=0 ppid=2723 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:34:02.017000 audit[2824]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.017000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc6a084a0 a2=0 a3=7fffc6a0848c items=0 ppid=2723 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:34:02.020000 audit[2826]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.020000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeef679450 a2=0 a3=7ffeef67943c items=0 ppid=2723 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:34:02.023000 audit[2829]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.023000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff410c55c0 a2=0 a3=7fff410c55ac items=0 ppid=2723 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:34:02.024000 audit[2830]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.024000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccf8c42d0 a2=0 a3=7ffccf8c42bc items=0 ppid=2723 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:34:02.027000 audit[2832]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.027000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5877c9b0 a2=0 a3=7ffd5877c99c items=0 ppid=2723 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:34:02.028000 audit[2833]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.028000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc2073750 a2=0 a3=7fffc207373c items=0 ppid=2723 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:34:02.031000 audit[2835]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.031000 audit[2835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4f046460 a2=0 a3=7ffd4f04644c items=0 ppid=2723 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:34:02.035000 audit[2838]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.035000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1ccf0e10 a2=0 a3=7fff1ccf0dfc items=0 ppid=2723 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:34:02.038000 audit[2841]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.038000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed6dac870 a2=0 a3=7ffed6dac85c items=0 ppid=2723 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:34:02.040000 audit[2842]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.040000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd58ad2c00 a2=0 a3=7ffd58ad2bec items=0 ppid=2723 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:34:02.042000 audit[2844]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.042000 audit[2844]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffceb9f2580 a2=0 a3=7ffceb9f256c items=0 ppid=2723 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:02.047000 audit[2847]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.047000 audit[2847]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc2339da70 a2=0 a3=7ffc2339da5c items=0 ppid=2723 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:34:02.049000 audit[2848]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.049000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0734fb90 a2=0 a3=7ffd0734fb7c items=0 ppid=2723 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:34:02.053000 audit[2850]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.053000 audit[2850]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd47f0c1b0 a2=0 a3=7ffd47f0c19c items=0 ppid=2723 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:34:02.054000 audit[2851]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.054000 audit[2851]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33f00210 a2=0 a3=7fff33f001fc items=0 ppid=2723 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:34:02.056000 audit[2853]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.056000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc23c1360 a2=0 a3=7ffdc23c134c items=0 ppid=2723 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:02.060000 audit[2856]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:34:02.060000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1dd69a80 a2=0 a3=7fff1dd69a6c items=0 ppid=2723 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:34:02.064000 audit[2858]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:02.064000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd9acd2150 a2=0 a3=7ffd9acd213c items=0 ppid=2723 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.064000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.064000 audit[2858]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:34:02.064000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd9acd2150 a2=0 a3=7ffd9acd213c items=0 ppid=2723 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.064000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:05.117102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount440467557.mount: Deactivated successfully. Dec 13 14:34:06.531309 env[1409]: time="2024-12-13T14:34:06.531253918Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.541075 env[1409]: time="2024-12-13T14:34:06.541028562Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.549006 env[1409]: time="2024-12-13T14:34:06.548953098Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.556047 env[1409]: time="2024-12-13T14:34:06.556010830Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:06.556483 env[1409]: time="2024-12-13T14:34:06.556444232Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:34:06.559269 env[1409]: time="2024-12-13T14:34:06.558668242Z" level=info msg="CreateContainer within sandbox \"9319fe39d30c6d3214510fcbea3672e833dd24b203ef6555d57801ac658a50eb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:34:06.607435 env[1409]: time="2024-12-13T14:34:06.607393362Z" level=info msg="CreateContainer within sandbox \"9319fe39d30c6d3214510fcbea3672e833dd24b203ef6555d57801ac658a50eb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d1d37932c8728d9bc13a97a227bebeb0fa2d62c18b4756cc505dc2f2266feaec\"" Dec 13 14:34:06.609227 env[1409]: time="2024-12-13T14:34:06.607998565Z" level=info msg="StartContainer for \"d1d37932c8728d9bc13a97a227bebeb0fa2d62c18b4756cc505dc2f2266feaec\"" Dec 13 14:34:06.630887 systemd[1]: Started cri-containerd-d1d37932c8728d9bc13a97a227bebeb0fa2d62c18b4756cc505dc2f2266feaec.scope. Dec 13 14:34:06.660594 kernel: kauditd_printk_skb: 125 callbacks suppressed Dec 13 14:34:06.660732 kernel: audit: type=1400 audit(1734100446.642:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.686480 kernel: audit: type=1400 audit(1734100446.642:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.686580 kernel: audit: type=1400 audit(1734100446.642:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699855 kernel: audit: type=1400 audit(1734100446.642:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.725048 kernel: audit: type=1400 audit(1734100446.642:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.725398 kernel: audit: type=1400 audit(1734100446.642:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.725425 kernel: audit: type=1400 audit(1734100446.642:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.750367 kernel: audit: type=1400 audit(1734100446.642:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.750503 kernel: audit: type=1400 audit(1734100446.642:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.777842 kernel: audit: type=1400 audit(1734100446.659:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.659000 audit: BPF prog-id=112 op=LOAD Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2671 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643337393332633837323864396263313361393761323237626562 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2671 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643337393332633837323864396263313361393761323237626562 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.660000 audit: BPF prog-id=113 op=LOAD Dec 13 14:34:06.660000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000245f0 items=0 ppid=2671 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643337393332633837323864396263313361393761323237626562 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.685000 audit: BPF prog-id=114 op=LOAD Dec 13 14:34:06.685000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024638 items=0 ppid=2671 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643337393332633837323864396263313361393761323237626562 Dec 13 14:34:06.698000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:34:06.699000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { perfmon } for pid=2867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit[2867]: AVC avc: denied { bpf } for pid=2867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:06.699000 audit: BPF prog-id=115 op=LOAD Dec 13 14:34:06.699000 audit[2867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024a48 items=0 ppid=2671 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:06.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643337393332633837323864396263313361393761323237626562 Dec 13 14:34:06.789841 env[1409]: time="2024-12-13T14:34:06.789385485Z" level=info msg="StartContainer for \"d1d37932c8728d9bc13a97a227bebeb0fa2d62c18b4756cc505dc2f2266feaec\" returns successfully" Dec 13 14:34:07.146511 kubelet[2545]: I1213 14:34:07.146472 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9xsgn" podStartSLOduration=7.146423889 podStartE2EDuration="7.146423889s" podCreationTimestamp="2024-12-13 14:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:02.14072236 +0000 UTC m=+14.232888212" watchObservedRunningTime="2024-12-13 14:34:07.146423889 +0000 UTC m=+19.238589641" Dec 13 14:34:09.763000 audit[2901]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.763000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffecc6389c0 a2=0 a3=7ffecc6389ac items=0 ppid=2723 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.763000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.768000 audit[2901]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.768000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffecc6389c0 a2=0 a3=0 items=0 ppid=2723 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.780000 audit[2903]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.780000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd48590f40 a2=0 a3=7ffd48590f2c items=0 ppid=2723 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.785000 audit[2903]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.785000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd48590f40 a2=0 a3=0 items=0 ppid=2723 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.959410 kubelet[2545]: I1213 14:34:09.958245 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-wzz84" podStartSLOduration=4.837920571 podStartE2EDuration="9.958190155s" podCreationTimestamp="2024-12-13 14:34:00 +0000 UTC" firstStartedPulling="2024-12-13 14:34:01.43660895 +0000 UTC m=+13.528774702" lastFinishedPulling="2024-12-13 14:34:06.556878534 +0000 UTC m=+18.649044286" observedRunningTime="2024-12-13 14:34:07.147116192 +0000 UTC m=+19.239282044" watchObservedRunningTime="2024-12-13 14:34:09.958190155 +0000 UTC m=+22.050356007" Dec 13 14:34:09.959410 kubelet[2545]: I1213 14:34:09.958408 2545 topology_manager.go:215] "Topology Admit Handler" podUID="70e6f543-0926-4851-9ada-1069adecc34e" podNamespace="calico-system" podName="calico-typha-64f5968945-qnn59" Dec 13 14:34:09.965690 systemd[1]: Created slice kubepods-besteffort-pod70e6f543_0926_4851_9ada_1069adecc34e.slice. Dec 13 14:34:09.977341 kubelet[2545]: W1213 14:34:09.977312 2545 reflector.go:539] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:09.977659 kubelet[2545]: E1213 14:34:09.977639 2545 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:09.977778 kubelet[2545]: W1213 14:34:09.977577 2545 reflector.go:539] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:09.977904 kubelet[2545]: E1213 14:34:09.977887 2545 reflector.go:147] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:09.977976 kubelet[2545]: W1213 14:34:09.977616 2545 reflector.go:539] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:09.978060 kubelet[2545]: E1213 14:34:09.978049 2545 reflector.go:147] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:10.061529 kubelet[2545]: I1213 14:34:10.061490 2545 topology_manager.go:215] "Topology Admit Handler" podUID="ebb4006b-90e0-4b6f-9141-88c3e3d14d98" podNamespace="calico-system" podName="calico-node-rl66j" Dec 13 14:34:10.069999 systemd[1]: Created slice kubepods-besteffort-podebb4006b_90e0_4b6f_9141_88c3e3d14d98.slice. Dec 13 14:34:10.071357 kubelet[2545]: W1213 14:34:10.071333 2545 reflector.go:539] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:10.071502 kubelet[2545]: E1213 14:34:10.071491 2545 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:10.071672 kubelet[2545]: W1213 14:34:10.071659 2545 reflector.go:539] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:10.071761 kubelet[2545]: E1213 14:34:10.071753 2545 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.6-a-1c166c7881" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-1c166c7881' and this object Dec 13 14:34:10.088467 kubelet[2545]: I1213 14:34:10.088427 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/70e6f543-0926-4851-9ada-1069adecc34e-typha-certs\") pod \"calico-typha-64f5968945-qnn59\" (UID: \"70e6f543-0926-4851-9ada-1069adecc34e\") " pod="calico-system/calico-typha-64f5968945-qnn59" Dec 13 14:34:10.088827 kubelet[2545]: I1213 14:34:10.088768 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/70e6f543-0926-4851-9ada-1069adecc34e-tigera-ca-bundle\") pod \"calico-typha-64f5968945-qnn59\" (UID: \"70e6f543-0926-4851-9ada-1069adecc34e\") " pod="calico-system/calico-typha-64f5968945-qnn59" Dec 13 14:34:10.089023 kubelet[2545]: I1213 14:34:10.088999 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tpx4f\" (UniqueName: \"kubernetes.io/projected/70e6f543-0926-4851-9ada-1069adecc34e-kube-api-access-tpx4f\") pod \"calico-typha-64f5968945-qnn59\" (UID: \"70e6f543-0926-4851-9ada-1069adecc34e\") " pod="calico-system/calico-typha-64f5968945-qnn59" Dec 13 14:34:10.189505 kubelet[2545]: I1213 14:34:10.189469 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-policysync\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.189818 kubelet[2545]: I1213 14:34:10.189780 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-xtables-lock\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190025 kubelet[2545]: I1213 14:34:10.190001 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-lib-modules\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190159 kubelet[2545]: I1213 14:34:10.190147 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-node-certs\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190320 kubelet[2545]: I1213 14:34:10.190299 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-tigera-ca-bundle\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190455 kubelet[2545]: I1213 14:34:10.190443 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-var-run-calico\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190568 kubelet[2545]: I1213 14:34:10.190558 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-cni-bin-dir\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190692 kubelet[2545]: I1213 14:34:10.190682 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-cni-log-dir\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190838 kubelet[2545]: I1213 14:34:10.190826 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-var-lib-calico\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.190941 kubelet[2545]: I1213 14:34:10.190932 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-cni-net-dir\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.191045 kubelet[2545]: I1213 14:34:10.191036 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-flexvol-driver-host\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.191164 kubelet[2545]: I1213 14:34:10.191153 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ww9jd\" (UniqueName: \"kubernetes.io/projected/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-kube-api-access-ww9jd\") pod \"calico-node-rl66j\" (UID: \"ebb4006b-90e0-4b6f-9141-88c3e3d14d98\") " pod="calico-system/calico-node-rl66j" Dec 13 14:34:10.216920 kubelet[2545]: I1213 14:34:10.216889 2545 topology_manager.go:215] "Topology Admit Handler" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" podNamespace="calico-system" podName="csi-node-driver-527d7" Dec 13 14:34:10.217469 kubelet[2545]: E1213 14:34:10.217443 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:10.293927 kubelet[2545]: E1213 14:34:10.293892 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.293927 kubelet[2545]: W1213 14:34:10.293921 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.294151 kubelet[2545]: E1213 14:34:10.293954 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.294465 kubelet[2545]: E1213 14:34:10.294437 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.294465 kubelet[2545]: W1213 14:34:10.294453 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.294657 kubelet[2545]: E1213 14:34:10.294640 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.294899 kubelet[2545]: E1213 14:34:10.294878 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.294899 kubelet[2545]: W1213 14:34:10.294892 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.295043 kubelet[2545]: E1213 14:34:10.294979 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.296892 kubelet[2545]: E1213 14:34:10.296870 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.296892 kubelet[2545]: W1213 14:34:10.296889 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.297061 kubelet[2545]: E1213 14:34:10.296982 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.297174 kubelet[2545]: E1213 14:34:10.297157 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.297174 kubelet[2545]: W1213 14:34:10.297174 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.297301 kubelet[2545]: E1213 14:34:10.297259 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.297415 kubelet[2545]: E1213 14:34:10.297400 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.297415 kubelet[2545]: W1213 14:34:10.297415 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.297539 kubelet[2545]: E1213 14:34:10.297500 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.297671 kubelet[2545]: E1213 14:34:10.297655 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.297671 kubelet[2545]: W1213 14:34:10.297671 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.297788 kubelet[2545]: E1213 14:34:10.297757 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.297909 kubelet[2545]: E1213 14:34:10.297893 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.297909 kubelet[2545]: W1213 14:34:10.297907 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.298048 kubelet[2545]: E1213 14:34:10.297926 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.298143 kubelet[2545]: E1213 14:34:10.298128 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.298211 kubelet[2545]: W1213 14:34:10.298143 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.298211 kubelet[2545]: E1213 14:34:10.298163 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.298498 kubelet[2545]: E1213 14:34:10.298480 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.298498 kubelet[2545]: W1213 14:34:10.298497 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.298649 kubelet[2545]: E1213 14:34:10.298516 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.298731 kubelet[2545]: E1213 14:34:10.298716 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.298804 kubelet[2545]: W1213 14:34:10.298732 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.298804 kubelet[2545]: E1213 14:34:10.298752 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.298992 kubelet[2545]: E1213 14:34:10.298970 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.298992 kubelet[2545]: W1213 14:34:10.298987 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.299112 kubelet[2545]: E1213 14:34:10.299007 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.299302 kubelet[2545]: E1213 14:34:10.299280 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.299302 kubelet[2545]: W1213 14:34:10.299297 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.299442 kubelet[2545]: E1213 14:34:10.299317 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.299590 kubelet[2545]: E1213 14:34:10.299559 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.299590 kubelet[2545]: W1213 14:34:10.299577 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.299590 kubelet[2545]: E1213 14:34:10.299596 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.299825 kubelet[2545]: E1213 14:34:10.299808 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.299825 kubelet[2545]: W1213 14:34:10.299825 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.299953 kubelet[2545]: E1213 14:34:10.299937 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.300087 kubelet[2545]: E1213 14:34:10.300072 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.300172 kubelet[2545]: W1213 14:34:10.300088 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.300231 kubelet[2545]: E1213 14:34:10.300174 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.300323 kubelet[2545]: E1213 14:34:10.300304 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.300323 kubelet[2545]: W1213 14:34:10.300318 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.300446 kubelet[2545]: E1213 14:34:10.300403 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.300593 kubelet[2545]: E1213 14:34:10.300571 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.300690 kubelet[2545]: W1213 14:34:10.300677 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.300776 kubelet[2545]: E1213 14:34:10.300766 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.301052 kubelet[2545]: E1213 14:34:10.301032 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.301155 kubelet[2545]: W1213 14:34:10.301143 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.301236 kubelet[2545]: E1213 14:34:10.301226 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.301538 kubelet[2545]: E1213 14:34:10.301525 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.301845 kubelet[2545]: W1213 14:34:10.301827 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.301946 kubelet[2545]: E1213 14:34:10.301935 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.302299 kubelet[2545]: E1213 14:34:10.302279 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.302299 kubelet[2545]: W1213 14:34:10.302296 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.302438 kubelet[2545]: E1213 14:34:10.302314 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.302514 kubelet[2545]: E1213 14:34:10.302498 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.302579 kubelet[2545]: W1213 14:34:10.302514 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.302579 kubelet[2545]: E1213 14:34:10.302530 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.302718 kubelet[2545]: E1213 14:34:10.302702 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.302781 kubelet[2545]: W1213 14:34:10.302719 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.302781 kubelet[2545]: E1213 14:34:10.302734 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.303031 kubelet[2545]: E1213 14:34:10.303013 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.303031 kubelet[2545]: W1213 14:34:10.303031 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.303177 kubelet[2545]: E1213 14:34:10.303047 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.303247 kubelet[2545]: E1213 14:34:10.303231 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.303295 kubelet[2545]: W1213 14:34:10.303249 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.303295 kubelet[2545]: E1213 14:34:10.303265 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.303446 kubelet[2545]: E1213 14:34:10.303432 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.303512 kubelet[2545]: W1213 14:34:10.303447 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.303512 kubelet[2545]: E1213 14:34:10.303462 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.303707 kubelet[2545]: E1213 14:34:10.303628 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.303707 kubelet[2545]: W1213 14:34:10.303639 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.303707 kubelet[2545]: E1213 14:34:10.303653 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.303890 kubelet[2545]: E1213 14:34:10.303832 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.303890 kubelet[2545]: W1213 14:34:10.303842 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.303890 kubelet[2545]: E1213 14:34:10.303860 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.304142 kubelet[2545]: E1213 14:34:10.304040 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.304142 kubelet[2545]: W1213 14:34:10.304051 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.304142 kubelet[2545]: E1213 14:34:10.304065 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.304370 kubelet[2545]: E1213 14:34:10.304247 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.304370 kubelet[2545]: W1213 14:34:10.304257 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.304370 kubelet[2545]: E1213 14:34:10.304273 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.304490 kubelet[2545]: E1213 14:34:10.304436 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.304490 kubelet[2545]: W1213 14:34:10.304445 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.304490 kubelet[2545]: E1213 14:34:10.304461 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.304645 kubelet[2545]: E1213 14:34:10.304619 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.304645 kubelet[2545]: W1213 14:34:10.304628 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.304645 kubelet[2545]: E1213 14:34:10.304642 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.304842 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.305525 kubelet[2545]: W1213 14:34:10.304855 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.304870 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.305048 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.305525 kubelet[2545]: W1213 14:34:10.305057 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.305070 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.305238 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.305525 kubelet[2545]: W1213 14:34:10.305248 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.305262 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.305525 kubelet[2545]: E1213 14:34:10.305434 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.305885 kubelet[2545]: W1213 14:34:10.305448 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.305885 kubelet[2545]: E1213 14:34:10.305466 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.393194 kubelet[2545]: E1213 14:34:10.393056 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.393194 kubelet[2545]: W1213 14:34:10.393088 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.393194 kubelet[2545]: E1213 14:34:10.393116 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.393501 kubelet[2545]: E1213 14:34:10.393359 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.393501 kubelet[2545]: W1213 14:34:10.393368 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.393501 kubelet[2545]: E1213 14:34:10.393382 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.393632 kubelet[2545]: E1213 14:34:10.393588 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.393632 kubelet[2545]: W1213 14:34:10.393598 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.393632 kubelet[2545]: E1213 14:34:10.393613 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.393774 kubelet[2545]: I1213 14:34:10.393647 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/dcc90994-ebda-4270-b0cd-139697d3f962-registration-dir\") pod \"csi-node-driver-527d7\" (UID: \"dcc90994-ebda-4270-b0cd-139697d3f962\") " pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:10.393904 kubelet[2545]: E1213 14:34:10.393882 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.393976 kubelet[2545]: W1213 14:34:10.393906 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.393976 kubelet[2545]: E1213 14:34:10.393927 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.393976 kubelet[2545]: I1213 14:34:10.393956 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljrdk\" (UniqueName: \"kubernetes.io/projected/dcc90994-ebda-4270-b0cd-139697d3f962-kube-api-access-ljrdk\") pod \"csi-node-driver-527d7\" (UID: \"dcc90994-ebda-4270-b0cd-139697d3f962\") " pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:10.394210 kubelet[2545]: E1213 14:34:10.394180 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.394210 kubelet[2545]: W1213 14:34:10.394200 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.394338 kubelet[2545]: E1213 14:34:10.394220 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.394338 kubelet[2545]: I1213 14:34:10.394245 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/dcc90994-ebda-4270-b0cd-139697d3f962-socket-dir\") pod \"csi-node-driver-527d7\" (UID: \"dcc90994-ebda-4270-b0cd-139697d3f962\") " pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:10.399366 kubelet[2545]: E1213 14:34:10.399190 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.399366 kubelet[2545]: W1213 14:34:10.399209 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.399366 kubelet[2545]: E1213 14:34:10.399234 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.399586 kubelet[2545]: E1213 14:34:10.399479 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.399586 kubelet[2545]: W1213 14:34:10.399491 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.399681 kubelet[2545]: E1213 14:34:10.399612 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.399763 kubelet[2545]: E1213 14:34:10.399752 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.399833 kubelet[2545]: W1213 14:34:10.399764 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.399936 kubelet[2545]: E1213 14:34:10.399919 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.400080 kubelet[2545]: E1213 14:34:10.400064 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.400165 kubelet[2545]: W1213 14:34:10.400082 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.400229 kubelet[2545]: E1213 14:34:10.400188 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.400325 kubelet[2545]: E1213 14:34:10.400307 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.400325 kubelet[2545]: W1213 14:34:10.400324 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.400515 kubelet[2545]: E1213 14:34:10.400411 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.400605 kubelet[2545]: E1213 14:34:10.400532 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.400605 kubelet[2545]: W1213 14:34:10.400540 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.400605 kubelet[2545]: E1213 14:34:10.400558 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.400605 kubelet[2545]: I1213 14:34:10.400584 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/dcc90994-ebda-4270-b0cd-139697d3f962-varrun\") pod \"csi-node-driver-527d7\" (UID: \"dcc90994-ebda-4270-b0cd-139697d3f962\") " pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:10.400782 kubelet[2545]: E1213 14:34:10.400755 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.400782 kubelet[2545]: W1213 14:34:10.400765 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.400782 kubelet[2545]: E1213 14:34:10.400780 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.401059 kubelet[2545]: E1213 14:34:10.401040 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.401059 kubelet[2545]: W1213 14:34:10.401059 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.401195 kubelet[2545]: E1213 14:34:10.401078 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.401195 kubelet[2545]: I1213 14:34:10.401105 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/dcc90994-ebda-4270-b0cd-139697d3f962-kubelet-dir\") pod \"csi-node-driver-527d7\" (UID: \"dcc90994-ebda-4270-b0cd-139697d3f962\") " pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:10.401324 kubelet[2545]: E1213 14:34:10.401301 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.401324 kubelet[2545]: W1213 14:34:10.401322 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.401437 kubelet[2545]: E1213 14:34:10.401345 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.401542 kubelet[2545]: E1213 14:34:10.401525 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.401617 kubelet[2545]: W1213 14:34:10.401542 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.401617 kubelet[2545]: E1213 14:34:10.401559 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.401851 kubelet[2545]: E1213 14:34:10.401808 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.402930 kubelet[2545]: W1213 14:34:10.402904 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.403016 kubelet[2545]: E1213 14:34:10.402940 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.403151 kubelet[2545]: E1213 14:34:10.403130 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.403151 kubelet[2545]: W1213 14:34:10.403148 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.403269 kubelet[2545]: E1213 14:34:10.403164 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.403407 kubelet[2545]: E1213 14:34:10.403388 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.403407 kubelet[2545]: W1213 14:34:10.403404 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.403537 kubelet[2545]: E1213 14:34:10.403425 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.403633 kubelet[2545]: E1213 14:34:10.403617 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.403685 kubelet[2545]: W1213 14:34:10.403633 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.403685 kubelet[2545]: E1213 14:34:10.403648 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.403871 kubelet[2545]: E1213 14:34:10.403853 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.403930 kubelet[2545]: W1213 14:34:10.403872 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.403930 kubelet[2545]: E1213 14:34:10.403887 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.404128 kubelet[2545]: E1213 14:34:10.404109 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.404128 kubelet[2545]: W1213 14:34:10.404126 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.404243 kubelet[2545]: E1213 14:34:10.404143 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.505039 kubelet[2545]: E1213 14:34:10.504739 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.505039 kubelet[2545]: W1213 14:34:10.504767 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.505039 kubelet[2545]: E1213 14:34:10.504826 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.505382 kubelet[2545]: E1213 14:34:10.505358 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.505382 kubelet[2545]: W1213 14:34:10.505376 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.505573 kubelet[2545]: E1213 14:34:10.505398 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.505767 kubelet[2545]: E1213 14:34:10.505748 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.505910 kubelet[2545]: W1213 14:34:10.505893 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.506021 kubelet[2545]: E1213 14:34:10.506006 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.506357 kubelet[2545]: E1213 14:34:10.506331 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.506357 kubelet[2545]: W1213 14:34:10.506349 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.506549 kubelet[2545]: E1213 14:34:10.506375 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.506720 kubelet[2545]: E1213 14:34:10.506706 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.506849 kubelet[2545]: W1213 14:34:10.506826 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.506925 kubelet[2545]: E1213 14:34:10.506861 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.507093 kubelet[2545]: E1213 14:34:10.507074 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.507093 kubelet[2545]: W1213 14:34:10.507093 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.507220 kubelet[2545]: E1213 14:34:10.507113 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.507386 kubelet[2545]: E1213 14:34:10.507368 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.507386 kubelet[2545]: W1213 14:34:10.507385 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.507499 kubelet[2545]: E1213 14:34:10.507478 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.507646 kubelet[2545]: E1213 14:34:10.507619 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.507646 kubelet[2545]: W1213 14:34:10.507637 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.507773 kubelet[2545]: E1213 14:34:10.507654 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.507916 kubelet[2545]: E1213 14:34:10.507899 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.507916 kubelet[2545]: W1213 14:34:10.507915 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.508036 kubelet[2545]: E1213 14:34:10.507935 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.508183 kubelet[2545]: E1213 14:34:10.508161 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.508183 kubelet[2545]: W1213 14:34:10.508178 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.508295 kubelet[2545]: E1213 14:34:10.508198 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.508437 kubelet[2545]: E1213 14:34:10.508412 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.508437 kubelet[2545]: W1213 14:34:10.508427 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.508551 kubelet[2545]: E1213 14:34:10.508447 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.508677 kubelet[2545]: E1213 14:34:10.508660 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.508677 kubelet[2545]: W1213 14:34:10.508676 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.508812 kubelet[2545]: E1213 14:34:10.508699 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.508973 kubelet[2545]: E1213 14:34:10.508947 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.508973 kubelet[2545]: W1213 14:34:10.508964 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.509073 kubelet[2545]: E1213 14:34:10.509052 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.509223 kubelet[2545]: E1213 14:34:10.509210 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.509289 kubelet[2545]: W1213 14:34:10.509222 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.509289 kubelet[2545]: E1213 14:34:10.509244 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.509464 kubelet[2545]: E1213 14:34:10.509447 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.509464 kubelet[2545]: W1213 14:34:10.509463 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.509589 kubelet[2545]: E1213 14:34:10.509483 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.509693 kubelet[2545]: E1213 14:34:10.509677 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.509763 kubelet[2545]: W1213 14:34:10.509693 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.509763 kubelet[2545]: E1213 14:34:10.509713 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.509975 kubelet[2545]: E1213 14:34:10.509960 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.510036 kubelet[2545]: W1213 14:34:10.509975 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.510036 kubelet[2545]: E1213 14:34:10.509995 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.510203 kubelet[2545]: E1213 14:34:10.510186 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.510203 kubelet[2545]: W1213 14:34:10.510202 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.510320 kubelet[2545]: E1213 14:34:10.510221 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.510482 kubelet[2545]: E1213 14:34:10.510460 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.510482 kubelet[2545]: W1213 14:34:10.510478 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.510590 kubelet[2545]: E1213 14:34:10.510571 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.510772 kubelet[2545]: E1213 14:34:10.510756 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.510772 kubelet[2545]: W1213 14:34:10.510768 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.511016 kubelet[2545]: E1213 14:34:10.510969 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.511016 kubelet[2545]: W1213 14:34:10.510979 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.511016 kubelet[2545]: E1213 14:34:10.510996 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.511175 kubelet[2545]: E1213 14:34:10.511160 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.511729 kubelet[2545]: E1213 14:34:10.511548 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.511729 kubelet[2545]: W1213 14:34:10.511563 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.511729 kubelet[2545]: E1213 14:34:10.511584 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.512137 kubelet[2545]: E1213 14:34:10.512108 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.512137 kubelet[2545]: W1213 14:34:10.512133 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.512261 kubelet[2545]: E1213 14:34:10.512155 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.512418 kubelet[2545]: E1213 14:34:10.512402 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.512418 kubelet[2545]: W1213 14:34:10.512414 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.512582 kubelet[2545]: E1213 14:34:10.512567 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.512731 kubelet[2545]: E1213 14:34:10.512587 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.512818 kubelet[2545]: W1213 14:34:10.512733 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.512944 kubelet[2545]: E1213 14:34:10.512929 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.512944 kubelet[2545]: W1213 14:34:10.512944 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.513051 kubelet[2545]: E1213 14:34:10.512960 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.513165 kubelet[2545]: E1213 14:34:10.513151 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.513218 kubelet[2545]: W1213 14:34:10.513179 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.513218 kubelet[2545]: E1213 14:34:10.513196 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.513382 kubelet[2545]: E1213 14:34:10.513357 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.513382 kubelet[2545]: W1213 14:34:10.513373 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.513472 kubelet[2545]: E1213 14:34:10.513387 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.513597 kubelet[2545]: E1213 14:34:10.513577 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.513714 kubelet[2545]: E1213 14:34:10.513695 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.513714 kubelet[2545]: W1213 14:34:10.513709 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.513919 kubelet[2545]: E1213 14:34:10.513729 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.513972 kubelet[2545]: E1213 14:34:10.513921 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.513972 kubelet[2545]: W1213 14:34:10.513932 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.513972 kubelet[2545]: E1213 14:34:10.513947 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.514175 kubelet[2545]: E1213 14:34:10.514157 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.514175 kubelet[2545]: W1213 14:34:10.514172 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.514287 kubelet[2545]: E1213 14:34:10.514188 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.611552 kubelet[2545]: E1213 14:34:10.611521 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.611552 kubelet[2545]: W1213 14:34:10.611543 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.611849 kubelet[2545]: E1213 14:34:10.611569 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.611849 kubelet[2545]: E1213 14:34:10.611848 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.611957 kubelet[2545]: W1213 14:34:10.611860 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.611957 kubelet[2545]: E1213 14:34:10.611878 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.612124 kubelet[2545]: E1213 14:34:10.612106 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.612124 kubelet[2545]: W1213 14:34:10.612119 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.612335 kubelet[2545]: E1213 14:34:10.612140 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.612385 kubelet[2545]: E1213 14:34:10.612361 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.612385 kubelet[2545]: W1213 14:34:10.612370 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.612385 kubelet[2545]: E1213 14:34:10.612385 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.612578 kubelet[2545]: E1213 14:34:10.612560 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.612578 kubelet[2545]: W1213 14:34:10.612573 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.612709 kubelet[2545]: E1213 14:34:10.612588 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.612786 kubelet[2545]: E1213 14:34:10.612768 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.612786 kubelet[2545]: W1213 14:34:10.612781 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.612909 kubelet[2545]: E1213 14:34:10.612814 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.613018 kubelet[2545]: E1213 14:34:10.613004 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.613018 kubelet[2545]: W1213 14:34:10.613016 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.613110 kubelet[2545]: E1213 14:34:10.613031 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.714401 kubelet[2545]: E1213 14:34:10.714292 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.714401 kubelet[2545]: W1213 14:34:10.714314 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.714401 kubelet[2545]: E1213 14:34:10.714342 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.714690 kubelet[2545]: E1213 14:34:10.714592 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.714690 kubelet[2545]: W1213 14:34:10.714605 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.714690 kubelet[2545]: E1213 14:34:10.714622 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.714882 kubelet[2545]: E1213 14:34:10.714824 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.714882 kubelet[2545]: W1213 14:34:10.714834 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.714882 kubelet[2545]: E1213 14:34:10.714850 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.715046 kubelet[2545]: E1213 14:34:10.715026 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.715046 kubelet[2545]: W1213 14:34:10.715041 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.715046 kubelet[2545]: E1213 14:34:10.715058 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.715255 kubelet[2545]: E1213 14:34:10.715238 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.715255 kubelet[2545]: W1213 14:34:10.715255 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.715348 kubelet[2545]: E1213 14:34:10.715270 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.715470 kubelet[2545]: E1213 14:34:10.715456 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.715470 kubelet[2545]: W1213 14:34:10.715467 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.715579 kubelet[2545]: E1213 14:34:10.715483 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.715690 kubelet[2545]: E1213 14:34:10.715678 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.715757 kubelet[2545]: W1213 14:34:10.715746 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.715850 kubelet[2545]: E1213 14:34:10.715840 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.795000 audit[3007]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:10.795000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe3e5f9f90 a2=0 a3=7ffe3e5f9f7c items=0 ppid=2723 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:10.800000 audit[3007]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:10.800000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe3e5f9f90 a2=0 a3=0 items=0 ppid=2723 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:10.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:10.817355 kubelet[2545]: E1213 14:34:10.817325 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.817355 kubelet[2545]: W1213 14:34:10.817347 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.817624 kubelet[2545]: E1213 14:34:10.817373 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.817624 kubelet[2545]: E1213 14:34:10.817612 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.817624 kubelet[2545]: W1213 14:34:10.817623 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.817862 kubelet[2545]: E1213 14:34:10.817640 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.817862 kubelet[2545]: E1213 14:34:10.817857 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.817990 kubelet[2545]: W1213 14:34:10.817867 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.817990 kubelet[2545]: E1213 14:34:10.817882 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.818085 kubelet[2545]: E1213 14:34:10.818077 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.818129 kubelet[2545]: W1213 14:34:10.818091 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.818129 kubelet[2545]: E1213 14:34:10.818107 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.818315 kubelet[2545]: E1213 14:34:10.818294 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.818315 kubelet[2545]: W1213 14:34:10.818308 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.818417 kubelet[2545]: E1213 14:34:10.818324 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.818554 kubelet[2545]: E1213 14:34:10.818534 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.818554 kubelet[2545]: W1213 14:34:10.818548 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.818670 kubelet[2545]: E1213 14:34:10.818565 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.818826 kubelet[2545]: E1213 14:34:10.818809 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.818826 kubelet[2545]: W1213 14:34:10.818823 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.818925 kubelet[2545]: E1213 14:34:10.818840 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.921075 kubelet[2545]: E1213 14:34:10.920823 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.921075 kubelet[2545]: W1213 14:34:10.920845 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.921075 kubelet[2545]: E1213 14:34:10.920877 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.921356 kubelet[2545]: E1213 14:34:10.921148 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.921356 kubelet[2545]: W1213 14:34:10.921159 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.921356 kubelet[2545]: E1213 14:34:10.921176 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.921494 kubelet[2545]: E1213 14:34:10.921396 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.921494 kubelet[2545]: W1213 14:34:10.921405 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.921494 kubelet[2545]: E1213 14:34:10.921425 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.921656 kubelet[2545]: E1213 14:34:10.921637 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.921718 kubelet[2545]: W1213 14:34:10.921657 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.921718 kubelet[2545]: E1213 14:34:10.921676 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.921915 kubelet[2545]: E1213 14:34:10.921898 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.921915 kubelet[2545]: W1213 14:34:10.921915 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.922050 kubelet[2545]: E1213 14:34:10.922007 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.922180 kubelet[2545]: E1213 14:34:10.922159 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.922180 kubelet[2545]: W1213 14:34:10.922172 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.922292 kubelet[2545]: E1213 14:34:10.922201 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:10.922458 kubelet[2545]: E1213 14:34:10.922442 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:10.922458 kubelet[2545]: W1213 14:34:10.922454 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:10.922560 kubelet[2545]: E1213 14:34:10.922472 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.024217 kubelet[2545]: E1213 14:34:11.024110 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.024217 kubelet[2545]: W1213 14:34:11.024130 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.024217 kubelet[2545]: E1213 14:34:11.024160 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.026066 kubelet[2545]: E1213 14:34:11.026045 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.026066 kubelet[2545]: W1213 14:34:11.026062 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.026252 kubelet[2545]: E1213 14:34:11.026088 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.026333 kubelet[2545]: E1213 14:34:11.026314 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.026333 kubelet[2545]: W1213 14:34:11.026329 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.026429 kubelet[2545]: E1213 14:34:11.026347 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.026586 kubelet[2545]: E1213 14:34:11.026569 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.026586 kubelet[2545]: W1213 14:34:11.026582 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.026739 kubelet[2545]: E1213 14:34:11.026598 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.026856 kubelet[2545]: E1213 14:34:11.026841 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.026856 kubelet[2545]: W1213 14:34:11.026853 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.026986 kubelet[2545]: E1213 14:34:11.026872 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.027099 kubelet[2545]: E1213 14:34:11.027080 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.027099 kubelet[2545]: W1213 14:34:11.027098 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.027211 kubelet[2545]: E1213 14:34:11.027113 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.127721 kubelet[2545]: E1213 14:34:11.127688 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.127721 kubelet[2545]: W1213 14:34:11.127710 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.128014 kubelet[2545]: E1213 14:34:11.127736 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.128014 kubelet[2545]: E1213 14:34:11.128003 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.128014 kubelet[2545]: W1213 14:34:11.128014 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.128176 kubelet[2545]: E1213 14:34:11.128031 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.128230 kubelet[2545]: E1213 14:34:11.128220 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.128274 kubelet[2545]: W1213 14:34:11.128230 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.128274 kubelet[2545]: E1213 14:34:11.128244 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.128439 kubelet[2545]: E1213 14:34:11.128423 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.128439 kubelet[2545]: W1213 14:34:11.128435 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.128548 kubelet[2545]: E1213 14:34:11.128450 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.192426 kubelet[2545]: E1213 14:34:11.192380 2545 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 14:34:11.192624 kubelet[2545]: E1213 14:34:11.192496 2545 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/70e6f543-0926-4851-9ada-1069adecc34e-typha-certs podName:70e6f543-0926-4851-9ada-1069adecc34e nodeName:}" failed. No retries permitted until 2024-12-13 14:34:11.692470837 +0000 UTC m=+23.784636689 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/70e6f543-0926-4851-9ada-1069adecc34e-typha-certs") pod "calico-typha-64f5968945-qnn59" (UID: "70e6f543-0926-4851-9ada-1069adecc34e") : failed to sync secret cache: timed out waiting for the condition Dec 13 14:34:11.206149 kubelet[2545]: E1213 14:34:11.206113 2545 projected.go:294] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.206149 kubelet[2545]: E1213 14:34:11.206156 2545 projected.go:200] Error preparing data for projected volume kube-api-access-tpx4f for pod calico-system/calico-typha-64f5968945-qnn59: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.206383 kubelet[2545]: E1213 14:34:11.206239 2545 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/70e6f543-0926-4851-9ada-1069adecc34e-kube-api-access-tpx4f podName:70e6f543-0926-4851-9ada-1069adecc34e nodeName:}" failed. No retries permitted until 2024-12-13 14:34:11.706215095 +0000 UTC m=+23.798380847 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-tpx4f" (UniqueName: "kubernetes.io/projected/70e6f543-0926-4851-9ada-1069adecc34e-kube-api-access-tpx4f") pod "calico-typha-64f5968945-qnn59" (UID: "70e6f543-0926-4851-9ada-1069adecc34e") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.229506 kubelet[2545]: E1213 14:34:11.229474 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.229506 kubelet[2545]: W1213 14:34:11.229496 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.229727 kubelet[2545]: E1213 14:34:11.229523 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.229818 kubelet[2545]: E1213 14:34:11.229779 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.229818 kubelet[2545]: W1213 14:34:11.229812 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.229935 kubelet[2545]: E1213 14:34:11.229831 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.230063 kubelet[2545]: E1213 14:34:11.230043 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.230063 kubelet[2545]: W1213 14:34:11.230060 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.230187 kubelet[2545]: E1213 14:34:11.230075 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.230304 kubelet[2545]: E1213 14:34:11.230288 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.230304 kubelet[2545]: W1213 14:34:11.230301 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.230395 kubelet[2545]: E1213 14:34:11.230317 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.302380 kubelet[2545]: E1213 14:34:11.302327 2545 projected.go:294] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.302380 kubelet[2545]: E1213 14:34:11.302382 2545 projected.go:200] Error preparing data for projected volume kube-api-access-ww9jd for pod calico-system/calico-node-rl66j: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.302617 kubelet[2545]: E1213 14:34:11.302461 2545 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-kube-api-access-ww9jd podName:ebb4006b-90e0-4b6f-9141-88c3e3d14d98 nodeName:}" failed. No retries permitted until 2024-12-13 14:34:11.802437002 +0000 UTC m=+23.894602854 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-ww9jd" (UniqueName: "kubernetes.io/projected/ebb4006b-90e0-4b6f-9141-88c3e3d14d98-kube-api-access-ww9jd") pod "calico-node-rl66j" (UID: "ebb4006b-90e0-4b6f-9141-88c3e3d14d98") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:34:11.331382 kubelet[2545]: E1213 14:34:11.331351 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.331382 kubelet[2545]: W1213 14:34:11.331373 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.331603 kubelet[2545]: E1213 14:34:11.331398 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.331698 kubelet[2545]: E1213 14:34:11.331643 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.331698 kubelet[2545]: W1213 14:34:11.331654 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.331698 kubelet[2545]: E1213 14:34:11.331672 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.331922 kubelet[2545]: E1213 14:34:11.331906 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.331922 kubelet[2545]: W1213 14:34:11.331921 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.332037 kubelet[2545]: E1213 14:34:11.331939 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.332178 kubelet[2545]: E1213 14:34:11.332161 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.332178 kubelet[2545]: W1213 14:34:11.332174 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.332265 kubelet[2545]: E1213 14:34:11.332193 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.356386 kubelet[2545]: E1213 14:34:11.356365 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.356515 kubelet[2545]: W1213 14:34:11.356503 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.356604 kubelet[2545]: E1213 14:34:11.356592 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.433640 kubelet[2545]: E1213 14:34:11.433602 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.433640 kubelet[2545]: W1213 14:34:11.433629 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.433939 kubelet[2545]: E1213 14:34:11.433660 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.434035 kubelet[2545]: E1213 14:34:11.433980 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.434035 kubelet[2545]: W1213 14:34:11.433995 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.434035 kubelet[2545]: E1213 14:34:11.434017 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.434276 kubelet[2545]: E1213 14:34:11.434252 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.434276 kubelet[2545]: W1213 14:34:11.434270 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.434409 kubelet[2545]: E1213 14:34:11.434291 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.535020 kubelet[2545]: E1213 14:34:11.534983 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.535020 kubelet[2545]: W1213 14:34:11.535009 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.535334 kubelet[2545]: E1213 14:34:11.535038 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.535334 kubelet[2545]: E1213 14:34:11.535324 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.535470 kubelet[2545]: W1213 14:34:11.535339 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.535470 kubelet[2545]: E1213 14:34:11.535360 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.535622 kubelet[2545]: E1213 14:34:11.535598 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.535684 kubelet[2545]: W1213 14:34:11.535623 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.535684 kubelet[2545]: E1213 14:34:11.535647 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.636621 kubelet[2545]: E1213 14:34:11.636497 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.636621 kubelet[2545]: W1213 14:34:11.636522 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.636621 kubelet[2545]: E1213 14:34:11.636551 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.637123 kubelet[2545]: E1213 14:34:11.636860 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.637123 kubelet[2545]: W1213 14:34:11.636874 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.637123 kubelet[2545]: E1213 14:34:11.636894 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.637287 kubelet[2545]: E1213 14:34:11.637128 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.637287 kubelet[2545]: W1213 14:34:11.637140 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.637287 kubelet[2545]: E1213 14:34:11.637158 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.737934 kubelet[2545]: E1213 14:34:11.737899 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.737934 kubelet[2545]: W1213 14:34:11.737923 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.738225 kubelet[2545]: E1213 14:34:11.737953 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.738326 kubelet[2545]: E1213 14:34:11.738250 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.738326 kubelet[2545]: W1213 14:34:11.738264 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.738326 kubelet[2545]: E1213 14:34:11.738282 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.738639 kubelet[2545]: E1213 14:34:11.738601 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.738639 kubelet[2545]: W1213 14:34:11.738619 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.738639 kubelet[2545]: E1213 14:34:11.738644 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.738961 kubelet[2545]: E1213 14:34:11.738937 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.738961 kubelet[2545]: W1213 14:34:11.738955 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.739099 kubelet[2545]: E1213 14:34:11.738980 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.739263 kubelet[2545]: E1213 14:34:11.739243 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.739263 kubelet[2545]: W1213 14:34:11.739258 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.739413 kubelet[2545]: E1213 14:34:11.739284 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.739576 kubelet[2545]: E1213 14:34:11.739556 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.739576 kubelet[2545]: W1213 14:34:11.739571 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.739726 kubelet[2545]: E1213 14:34:11.739596 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.739892 kubelet[2545]: E1213 14:34:11.739870 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.739971 kubelet[2545]: W1213 14:34:11.739892 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.740060 kubelet[2545]: E1213 14:34:11.739992 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.740499 kubelet[2545]: E1213 14:34:11.740473 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.740499 kubelet[2545]: W1213 14:34:11.740494 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.740664 kubelet[2545]: E1213 14:34:11.740515 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.740744 kubelet[2545]: E1213 14:34:11.740724 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.740744 kubelet[2545]: W1213 14:34:11.740743 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.740921 kubelet[2545]: E1213 14:34:11.740761 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.740993 kubelet[2545]: E1213 14:34:11.740977 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.740993 kubelet[2545]: W1213 14:34:11.740989 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.741109 kubelet[2545]: E1213 14:34:11.741010 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.741265 kubelet[2545]: E1213 14:34:11.741241 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.741265 kubelet[2545]: W1213 14:34:11.741262 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.741386 kubelet[2545]: E1213 14:34:11.741280 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.755067 kubelet[2545]: E1213 14:34:11.754858 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.755067 kubelet[2545]: W1213 14:34:11.754982 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.755067 kubelet[2545]: E1213 14:34:11.755007 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.756642 kubelet[2545]: E1213 14:34:11.756624 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.756759 kubelet[2545]: W1213 14:34:11.756745 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.756866 kubelet[2545]: E1213 14:34:11.756853 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.770765 env[1409]: time="2024-12-13T14:34:11.770725584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64f5968945-qnn59,Uid:70e6f543-0926-4851-9ada-1069adecc34e,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:11.813015 env[1409]: time="2024-12-13T14:34:11.812928063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:11.813157 env[1409]: time="2024-12-13T14:34:11.813030164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:11.813157 env[1409]: time="2024-12-13T14:34:11.813063564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:11.813271 env[1409]: time="2024-12-13T14:34:11.813233864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a692f61820c051c00460a55ba1b541c841166dca8928c0a9fd8cbe4827daacb9 pid=3075 runtime=io.containerd.runc.v2 Dec 13 14:34:11.825079 systemd[1]: Started cri-containerd-a692f61820c051c00460a55ba1b541c841166dca8928c0a9fd8cbe4827daacb9.scope. Dec 13 14:34:11.840163 kubelet[2545]: E1213 14:34:11.840126 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.840163 kubelet[2545]: W1213 14:34:11.840153 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.840359 kubelet[2545]: E1213 14:34:11.840179 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.840763 kubelet[2545]: E1213 14:34:11.840660 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.840763 kubelet[2545]: W1213 14:34:11.840757 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.840960 kubelet[2545]: E1213 14:34:11.840777 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.841583 kubelet[2545]: E1213 14:34:11.841564 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.841583 kubelet[2545]: W1213 14:34:11.841579 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.841725 kubelet[2545]: E1213 14:34:11.841596 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.841820 kubelet[2545]: E1213 14:34:11.841806 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.841884 kubelet[2545]: W1213 14:34:11.841821 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.841884 kubelet[2545]: E1213 14:34:11.841836 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.842064 kubelet[2545]: E1213 14:34:11.842045 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.842064 kubelet[2545]: W1213 14:34:11.842058 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.842161 kubelet[2545]: E1213 14:34:11.842074 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.847304 kubelet[2545]: E1213 14:34:11.847283 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:11.847304 kubelet[2545]: W1213 14:34:11.847297 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:11.847489 kubelet[2545]: E1213 14:34:11.847313 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:11.870081 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 14:34:11.870178 kernel: audit: type=1400 audit(1734100451.849:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.885951 env[1409]: time="2024-12-13T14:34:11.884143664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rl66j,Uid:ebb4006b-90e0-4b6f-9141-88c3e3d14d98,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:11.895210 kernel: audit: type=1400 audit(1734100451.849:944): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895312 kernel: audit: type=1400 audit(1734100451.849:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.910902 kernel: audit: type=1400 audit(1734100451.849:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.928896 kernel: audit: type=1400 audit(1734100451.849:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.957095 kernel: audit: type=1400 audit(1734100451.849:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.957213 kernel: audit: type=1400 audit(1734100451.849:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.970583 kernel: audit: type=1400 audit(1734100451.849:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.988632 kernel: audit: type=1400 audit(1734100451.849:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.003309 env[1409]: time="2024-12-13T14:34:11.995096634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:12.003309 env[1409]: time="2024-12-13T14:34:11.995169434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:12.003309 env[1409]: time="2024-12-13T14:34:11.996464040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:12.003309 env[1409]: time="2024-12-13T14:34:11.996645841Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa pid=3114 runtime=io.containerd.runc.v2 Dec 13 14:34:12.006918 kernel: audit: type=1400 audit(1734100451.882:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.882000 audit: BPF prog-id=116 op=LOAD Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393266363138323063303531633030343630613535626131623534 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393266363138323063303531633030343630613535626131623534 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.894000 audit: BPF prog-id=117 op=LOAD Dec 13 14:34:11.894000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c84a0 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393266363138323063303531633030343630613535626131623534 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit: BPF prog-id=118 op=LOAD Dec 13 14:34:11.895000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c84e8 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393266363138323063303531633030343630613535626131623534 Dec 13 14:34:11.895000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:34:11.895000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:11.895000 audit: BPF prog-id=119 op=LOAD Dec 13 14:34:11.895000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c88f8 items=0 ppid=3075 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393266363138323063303531633030343630613535626131623534 Dec 13 14:34:12.045444 kubelet[2545]: E1213 14:34:12.045409 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:12.052098 env[1409]: time="2024-12-13T14:34:12.052031973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64f5968945-qnn59,Uid:70e6f543-0926-4851-9ada-1069adecc34e,Namespace:calico-system,Attempt:0,} returns sandbox id \"a692f61820c051c00460a55ba1b541c841166dca8928c0a9fd8cbe4827daacb9\"" Dec 13 14:34:12.056395 env[1409]: time="2024-12-13T14:34:12.056355291Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:34:12.062020 systemd[1]: Started cri-containerd-bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa.scope. Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.073000 audit: BPF prog-id=120 op=LOAD Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3114 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266626263653936663831663939623632663163346436663730646166 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3114 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266626263653936663831663939623632663163346436663730646166 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit: BPF prog-id=121 op=LOAD Dec 13 14:34:12.075000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032d050 items=0 ppid=3114 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266626263653936663831663939623632663163346436663730646166 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit: BPF prog-id=122 op=LOAD Dec 13 14:34:12.075000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032d098 items=0 ppid=3114 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266626263653936663831663939623632663163346436663730646166 Dec 13 14:34:12.075000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:34:12.075000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.075000 audit: BPF prog-id=123 op=LOAD Dec 13 14:34:12.075000 audit[3126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032d4a8 items=0 ppid=3114 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266626263653936663831663939623632663163346436663730646166 Dec 13 14:34:12.091591 env[1409]: time="2024-12-13T14:34:12.091550438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rl66j,Uid:ebb4006b-90e0-4b6f-9141-88c3e3d14d98,Namespace:calico-system,Attempt:0,} returns sandbox id \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\"" Dec 13 14:34:12.918022 systemd[1]: run-containerd-runc-k8s.io-bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa-runc.Kzbcom.mount: Deactivated successfully. Dec 13 14:34:13.361452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3814684223.mount: Deactivated successfully. Dec 13 14:34:14.045283 kubelet[2545]: E1213 14:34:14.045243 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:14.426311 env[1409]: time="2024-12-13T14:34:14.426185104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:14.434012 env[1409]: time="2024-12-13T14:34:14.433967336Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:14.444338 env[1409]: time="2024-12-13T14:34:14.444293078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:14.449814 env[1409]: time="2024-12-13T14:34:14.449757300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:14.450318 env[1409]: time="2024-12-13T14:34:14.450285502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:34:14.453210 env[1409]: time="2024-12-13T14:34:14.451348007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:34:14.470815 env[1409]: time="2024-12-13T14:34:14.470753386Z" level=info msg="CreateContainer within sandbox \"a692f61820c051c00460a55ba1b541c841166dca8928c0a9fd8cbe4827daacb9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:34:14.503448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount970512764.mount: Deactivated successfully. Dec 13 14:34:14.523532 env[1409]: time="2024-12-13T14:34:14.523484501Z" level=info msg="CreateContainer within sandbox \"a692f61820c051c00460a55ba1b541c841166dca8928c0a9fd8cbe4827daacb9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0f18e77efd85c712c9cbc6dbf3e0fb9b1eb861174e9a45301c155aa3ecfca24e\"" Dec 13 14:34:14.524251 env[1409]: time="2024-12-13T14:34:14.524210704Z" level=info msg="StartContainer for \"0f18e77efd85c712c9cbc6dbf3e0fb9b1eb861174e9a45301c155aa3ecfca24e\"" Dec 13 14:34:14.547324 systemd[1]: Started cri-containerd-0f18e77efd85c712c9cbc6dbf3e0fb9b1eb861174e9a45301c155aa3ecfca24e.scope. Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.569000 audit: BPF prog-id=124 op=LOAD Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3075 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313865373765666438356337313263396362633664626633653066 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3075 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313865373765666438356337313263396362633664626633653066 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit: BPF prog-id=125 op=LOAD Dec 13 14:34:14.570000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000345b90 items=0 ppid=3075 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313865373765666438356337313263396362633664626633653066 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.570000 audit: BPF prog-id=126 op=LOAD Dec 13 14:34:14.570000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000345bd8 items=0 ppid=3075 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313865373765666438356337313263396362633664626633653066 Dec 13 14:34:14.571000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:34:14.571000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:14.571000 audit: BPF prog-id=127 op=LOAD Dec 13 14:34:14.571000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000345fe8 items=0 ppid=3075 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:14.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066313865373765666438356337313263396362633664626633653066 Dec 13 14:34:14.605945 env[1409]: time="2024-12-13T14:34:14.605839337Z" level=info msg="StartContainer for \"0f18e77efd85c712c9cbc6dbf3e0fb9b1eb861174e9a45301c155aa3ecfca24e\" returns successfully" Dec 13 14:34:15.164299 kubelet[2545]: I1213 14:34:15.164263 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-64f5968945-qnn59" podStartSLOduration=3.768739889 podStartE2EDuration="6.164215708s" podCreationTimestamp="2024-12-13 14:34:09 +0000 UTC" firstStartedPulling="2024-12-13 14:34:12.055595287 +0000 UTC m=+24.147761039" lastFinishedPulling="2024-12-13 14:34:14.451071106 +0000 UTC m=+26.543236858" observedRunningTime="2024-12-13 14:34:15.163669706 +0000 UTC m=+27.255835458" watchObservedRunningTime="2024-12-13 14:34:15.164215708 +0000 UTC m=+27.256381560" Dec 13 14:34:15.238445 kubelet[2545]: E1213 14:34:15.238411 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.238445 kubelet[2545]: W1213 14:34:15.238434 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.238729 kubelet[2545]: E1213 14:34:15.238461 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.238729 kubelet[2545]: E1213 14:34:15.238690 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.238729 kubelet[2545]: W1213 14:34:15.238702 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.238729 kubelet[2545]: E1213 14:34:15.238720 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239029 kubelet[2545]: E1213 14:34:15.238926 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239029 kubelet[2545]: W1213 14:34:15.238938 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.239029 kubelet[2545]: E1213 14:34:15.238955 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239180 kubelet[2545]: E1213 14:34:15.239133 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239180 kubelet[2545]: W1213 14:34:15.239143 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.239180 kubelet[2545]: E1213 14:34:15.239160 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239346 kubelet[2545]: E1213 14:34:15.239337 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239402 kubelet[2545]: W1213 14:34:15.239347 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.239402 kubelet[2545]: E1213 14:34:15.239361 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239543 kubelet[2545]: E1213 14:34:15.239522 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239543 kubelet[2545]: W1213 14:34:15.239533 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.239694 kubelet[2545]: E1213 14:34:15.239549 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239749 kubelet[2545]: E1213 14:34:15.239715 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239749 kubelet[2545]: W1213 14:34:15.239724 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.239749 kubelet[2545]: E1213 14:34:15.239741 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.239951 kubelet[2545]: E1213 14:34:15.239934 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.239951 kubelet[2545]: W1213 14:34:15.239949 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.240092 kubelet[2545]: E1213 14:34:15.239967 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.240174 kubelet[2545]: E1213 14:34:15.240155 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.240174 kubelet[2545]: W1213 14:34:15.240170 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.240308 kubelet[2545]: E1213 14:34:15.240185 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.240358 kubelet[2545]: E1213 14:34:15.240352 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.240417 kubelet[2545]: W1213 14:34:15.240361 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.240417 kubelet[2545]: E1213 14:34:15.240377 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.240550 kubelet[2545]: E1213 14:34:15.240540 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.240622 kubelet[2545]: W1213 14:34:15.240550 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.240622 kubelet[2545]: E1213 14:34:15.240566 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.240743 kubelet[2545]: E1213 14:34:15.240734 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.240820 kubelet[2545]: W1213 14:34:15.240744 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.240820 kubelet[2545]: E1213 14:34:15.240758 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.240979 kubelet[2545]: E1213 14:34:15.240960 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.240979 kubelet[2545]: W1213 14:34:15.240975 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.241115 kubelet[2545]: E1213 14:34:15.240990 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.241169 kubelet[2545]: E1213 14:34:15.241161 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.241224 kubelet[2545]: W1213 14:34:15.241171 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.241224 kubelet[2545]: E1213 14:34:15.241185 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.241372 kubelet[2545]: E1213 14:34:15.241353 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.241372 kubelet[2545]: W1213 14:34:15.241368 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.241484 kubelet[2545]: E1213 14:34:15.241383 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.268863 kubelet[2545]: E1213 14:34:15.268833 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.268863 kubelet[2545]: W1213 14:34:15.268853 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.269095 kubelet[2545]: E1213 14:34:15.268874 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.269223 kubelet[2545]: E1213 14:34:15.269200 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.269223 kubelet[2545]: W1213 14:34:15.269218 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.269368 kubelet[2545]: E1213 14:34:15.269245 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.269584 kubelet[2545]: E1213 14:34:15.269562 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.269584 kubelet[2545]: W1213 14:34:15.269578 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.269774 kubelet[2545]: E1213 14:34:15.269604 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.269932 kubelet[2545]: E1213 14:34:15.269913 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.269932 kubelet[2545]: W1213 14:34:15.269928 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.270097 kubelet[2545]: E1213 14:34:15.269955 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.270224 kubelet[2545]: E1213 14:34:15.270207 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.270224 kubelet[2545]: W1213 14:34:15.270221 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.270395 kubelet[2545]: E1213 14:34:15.270324 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.270480 kubelet[2545]: E1213 14:34:15.270468 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.270569 kubelet[2545]: W1213 14:34:15.270482 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.270646 kubelet[2545]: E1213 14:34:15.270577 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.270742 kubelet[2545]: E1213 14:34:15.270725 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.270742 kubelet[2545]: W1213 14:34:15.270740 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.270963 kubelet[2545]: E1213 14:34:15.270828 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.271034 kubelet[2545]: E1213 14:34:15.271024 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.271147 kubelet[2545]: W1213 14:34:15.271036 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.271147 kubelet[2545]: E1213 14:34:15.271064 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.271336 kubelet[2545]: E1213 14:34:15.271313 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.271336 kubelet[2545]: W1213 14:34:15.271331 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.271527 kubelet[2545]: E1213 14:34:15.271356 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.272021 kubelet[2545]: E1213 14:34:15.271998 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.272021 kubelet[2545]: W1213 14:34:15.272014 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.272258 kubelet[2545]: E1213 14:34:15.272240 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.272377 kubelet[2545]: E1213 14:34:15.272260 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.272377 kubelet[2545]: W1213 14:34:15.272375 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.272607 kubelet[2545]: E1213 14:34:15.272438 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.272607 kubelet[2545]: E1213 14:34:15.272599 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.272777 kubelet[2545]: W1213 14:34:15.272613 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.272777 kubelet[2545]: E1213 14:34:15.272637 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.272942 kubelet[2545]: E1213 14:34:15.272900 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.272942 kubelet[2545]: W1213 14:34:15.272912 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.272942 kubelet[2545]: E1213 14:34:15.272937 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.273205 kubelet[2545]: E1213 14:34:15.273187 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.273205 kubelet[2545]: W1213 14:34:15.273201 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.273295 kubelet[2545]: E1213 14:34:15.273221 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.273554 kubelet[2545]: E1213 14:34:15.273538 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.273554 kubelet[2545]: W1213 14:34:15.273550 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.273693 kubelet[2545]: E1213 14:34:15.273632 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.273779 kubelet[2545]: E1213 14:34:15.273763 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.273779 kubelet[2545]: W1213 14:34:15.273777 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.273899 kubelet[2545]: E1213 14:34:15.273842 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.274068 kubelet[2545]: E1213 14:34:15.274052 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.274068 kubelet[2545]: W1213 14:34:15.274064 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.274188 kubelet[2545]: E1213 14:34:15.274080 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.274436 kubelet[2545]: E1213 14:34:15.274421 2545 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:34:15.274436 kubelet[2545]: W1213 14:34:15.274433 2545 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:34:15.274529 kubelet[2545]: E1213 14:34:15.274449 2545 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:34:15.954986 env[1409]: time="2024-12-13T14:34:15.954936097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.962912 env[1409]: time="2024-12-13T14:34:15.962874929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.967031 env[1409]: time="2024-12-13T14:34:15.966994046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.973730 env[1409]: time="2024-12-13T14:34:15.973696173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.974159 env[1409]: time="2024-12-13T14:34:15.974126675Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:34:15.977351 env[1409]: time="2024-12-13T14:34:15.977321488Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:34:16.011266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2505704184.mount: Deactivated successfully. Dec 13 14:34:16.027298 env[1409]: time="2024-12-13T14:34:16.027250188Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f\"" Dec 13 14:34:16.029175 env[1409]: time="2024-12-13T14:34:16.029140995Z" level=info msg="StartContainer for \"8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f\"" Dec 13 14:34:16.045741 kubelet[2545]: E1213 14:34:16.043756 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:16.063394 systemd[1]: Started cri-containerd-8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f.scope. Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa25631f208 items=0 ppid=3114 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343366343535333534656330393662373062313164363038316335 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit: BPF prog-id=128 op=LOAD Dec 13 14:34:16.080000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001ebfa8 items=0 ppid=3114 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343366343535333534656330393662373062313164363038316335 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit: BPF prog-id=129 op=LOAD Dec 13 14:34:16.080000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001ebff8 items=0 ppid=3114 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343366343535333534656330393662373062313164363038316335 Dec 13 14:34:16.080000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:34:16.080000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:16.080000 audit: BPF prog-id=130 op=LOAD Dec 13 14:34:16.080000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ca088 items=0 ppid=3114 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343366343535333534656330393662373062313164363038316335 Dec 13 14:34:16.099200 env[1409]: time="2024-12-13T14:34:16.099150174Z" level=info msg="StartContainer for \"8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f\" returns successfully" Dec 13 14:34:16.109855 systemd[1]: cri-containerd-8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f.scope: Deactivated successfully. Dec 13 14:34:16.113000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:34:16.154097 kubelet[2545]: I1213 14:34:16.154063 2545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:34:16.458248 systemd[1]: run-containerd-runc-k8s.io-8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f-runc.kR5H0D.mount: Deactivated successfully. Dec 13 14:34:16.458368 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f-rootfs.mount: Deactivated successfully. Dec 13 14:34:17.491416 env[1409]: time="2024-12-13T14:34:17.491362804Z" level=info msg="shim disconnected" id=8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f Dec 13 14:34:17.491945 env[1409]: time="2024-12-13T14:34:17.491431704Z" level=warning msg="cleaning up after shim disconnected" id=8843f455354ec096b70b11d6081c521a6be00970a88eb0d73330cc4fa41e374f namespace=k8s.io Dec 13 14:34:17.491945 env[1409]: time="2024-12-13T14:34:17.491445804Z" level=info msg="cleaning up dead shim" Dec 13 14:34:17.500263 env[1409]: time="2024-12-13T14:34:17.500218039Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3275 runtime=io.containerd.runc.v2\n" Dec 13 14:34:18.044067 kubelet[2545]: E1213 14:34:18.044024 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:18.160995 env[1409]: time="2024-12-13T14:34:18.160683836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:34:20.043766 kubelet[2545]: E1213 14:34:20.043330 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:20.959139 kubelet[2545]: I1213 14:34:20.959094 2545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:34:21.209389 kernel: kauditd_printk_skb: 205 callbacks suppressed Dec 13 14:34:21.209535 kernel: audit: type=1325 audit(1734100461.192:1004): table=filter:98 family=2 entries=17 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:21.192000 audit[3290]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:21.192000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1e225710 a2=0 a3=7ffd1e2256fc items=0 ppid=2723 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:21.242301 kernel: audit: type=1300 audit(1734100461.192:1004): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1e225710 a2=0 a3=7ffd1e2256fc items=0 ppid=2723 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.242409 kernel: audit: type=1327 audit(1734100461.192:1004): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:21.242000 audit[3290]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:21.254867 kernel: audit: type=1325 audit(1734100461.242:1005): table=nat:99 family=2 entries=19 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:21.242000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd1e225710 a2=0 a3=7ffd1e2256fc items=0 ppid=2723 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.275835 kernel: audit: type=1300 audit(1734100461.242:1005): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd1e225710 a2=0 a3=7ffd1e2256fc items=0 ppid=2723 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:21.287812 kernel: audit: type=1327 audit(1734100461.242:1005): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:22.043970 kubelet[2545]: E1213 14:34:22.043719 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:22.822266 env[1409]: time="2024-12-13T14:34:22.822211138Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.828153 env[1409]: time="2024-12-13T14:34:22.828108160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.831337 env[1409]: time="2024-12-13T14:34:22.831301172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.838065 env[1409]: time="2024-12-13T14:34:22.834780485Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:22.838065 env[1409]: time="2024-12-13T14:34:22.835141287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:34:22.839186 env[1409]: time="2024-12-13T14:34:22.839149902Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:34:22.887858 env[1409]: time="2024-12-13T14:34:22.887802584Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752\"" Dec 13 14:34:22.888675 env[1409]: time="2024-12-13T14:34:22.888621187Z" level=info msg="StartContainer for \"9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752\"" Dec 13 14:34:22.922323 systemd[1]: run-containerd-runc-k8s.io-9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752-runc.mjI5gr.mount: Deactivated successfully. Dec 13 14:34:22.925287 systemd[1]: Started cri-containerd-9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752.scope. Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4e91eb9588 items=0 ppid=3114 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.974812 kernel: audit: type=1400 audit(1734100462.940:1006): avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974930 kernel: audit: type=1300 audit(1734100462.940:1006): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4e91eb9588 items=0 ppid=3114 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633638383563346431633830656332666431626165613233663139 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:23.007920 env[1409]: time="2024-12-13T14:34:23.007881833Z" level=info msg="StartContainer for \"9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752\" returns successfully" Dec 13 14:34:23.011710 kernel: audit: type=1327 audit(1734100462.940:1006): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633638383563346431633830656332666431626165613233663139 Dec 13 14:34:23.011824 kernel: audit: type=1400 audit(1734100462.940:1007): avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.940000 audit: BPF prog-id=131 op=LOAD Dec 13 14:34:22.940000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00033fed8 items=0 ppid=3114 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633638383563346431633830656332666431626165613233663139 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit: BPF prog-id=132 op=LOAD Dec 13 14:34:22.974000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00033ff28 items=0 ppid=3114 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633638383563346431633830656332666431626165613233663139 Dec 13 14:34:22.974000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:34:22.974000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { perfmon } for pid=3299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit[3299]: AVC avc: denied { bpf } for pid=3299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:22.974000 audit: BPF prog-id=133 op=LOAD Dec 13 14:34:22.974000 audit[3299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00033ffb8 items=0 ppid=3114 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:22.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633638383563346431633830656332666431626165613233663139 Dec 13 14:34:24.044389 kubelet[2545]: E1213 14:34:24.044343 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:24.457199 env[1409]: time="2024-12-13T14:34:24.456697482Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:34:24.459058 systemd[1]: cri-containerd-9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752.scope: Deactivated successfully. Dec 13 14:34:24.463000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:34:24.479322 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752-rootfs.mount: Deactivated successfully. Dec 13 14:34:24.531072 kubelet[2545]: I1213 14:34:24.530215 2545 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.566525 2545 topology_manager.go:215] "Topology Admit Handler" podUID="f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33" podNamespace="kube-system" podName="coredns-76f75df574-ph6vh" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.576463 2545 topology_manager.go:215] "Topology Admit Handler" podUID="770f4569-8644-42a6-aed1-7f9488a4e9c8" podNamespace="kube-system" podName="coredns-76f75df574-42msn" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.580014 2545 topology_manager.go:215] "Topology Admit Handler" podUID="bf4f0892-5d28-438d-92c6-aebba7f22e3b" podNamespace="calico-system" podName="calico-kube-controllers-5cc5579557-nhcjh" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.590416 2545 topology_manager.go:215] "Topology Admit Handler" podUID="6c319a59-355a-430d-9659-bcc56212a666" podNamespace="calico-apiserver" podName="calico-apiserver-7947c94f84-ndlwz" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.590615 2545 topology_manager.go:215] "Topology Admit Handler" podUID="4b4e8915-4b2a-48a5-91fb-774965519f12" podNamespace="calico-apiserver" podName="calico-apiserver-7947c94f84-cbvjc" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.636906 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33-config-volume\") pod \"coredns-76f75df574-ph6vh\" (UID: \"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33\") " pod="kube-system/coredns-76f75df574-ph6vh" Dec 13 14:34:25.030634 kubelet[2545]: I1213 14:34:24.636950 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vmqgm\" (UniqueName: \"kubernetes.io/projected/4b4e8915-4b2a-48a5-91fb-774965519f12-kube-api-access-vmqgm\") pod \"calico-apiserver-7947c94f84-cbvjc\" (UID: \"4b4e8915-4b2a-48a5-91fb-774965519f12\") " pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" Dec 13 14:34:24.573322 systemd[1]: Created slice kubepods-burstable-podf3f9ab19_baa2_42ff_9fe0_1df5aae8ec33.slice. Dec 13 14:34:25.031266 kubelet[2545]: I1213 14:34:24.636994 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6c319a59-355a-430d-9659-bcc56212a666-calico-apiserver-certs\") pod \"calico-apiserver-7947c94f84-ndlwz\" (UID: \"6c319a59-355a-430d-9659-bcc56212a666\") " pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" Dec 13 14:34:25.031266 kubelet[2545]: I1213 14:34:24.637027 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b8snv\" (UniqueName: \"kubernetes.io/projected/bf4f0892-5d28-438d-92c6-aebba7f22e3b-kube-api-access-b8snv\") pod \"calico-kube-controllers-5cc5579557-nhcjh\" (UID: \"bf4f0892-5d28-438d-92c6-aebba7f22e3b\") " pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" Dec 13 14:34:25.031266 kubelet[2545]: I1213 14:34:24.637057 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2fzq7\" (UniqueName: \"kubernetes.io/projected/f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33-kube-api-access-2fzq7\") pod \"coredns-76f75df574-ph6vh\" (UID: \"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33\") " pod="kube-system/coredns-76f75df574-ph6vh" Dec 13 14:34:25.031266 kubelet[2545]: I1213 14:34:24.637088 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-snb9v\" (UniqueName: \"kubernetes.io/projected/770f4569-8644-42a6-aed1-7f9488a4e9c8-kube-api-access-snb9v\") pod \"coredns-76f75df574-42msn\" (UID: \"770f4569-8644-42a6-aed1-7f9488a4e9c8\") " pod="kube-system/coredns-76f75df574-42msn" Dec 13 14:34:25.031266 kubelet[2545]: I1213 14:34:24.637116 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bf4f0892-5d28-438d-92c6-aebba7f22e3b-tigera-ca-bundle\") pod \"calico-kube-controllers-5cc5579557-nhcjh\" (UID: \"bf4f0892-5d28-438d-92c6-aebba7f22e3b\") " pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" Dec 13 14:34:24.588131 systemd[1]: Created slice kubepods-burstable-pod770f4569_8644_42a6_aed1_7f9488a4e9c8.slice. Dec 13 14:34:25.031568 kubelet[2545]: I1213 14:34:24.637153 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/770f4569-8644-42a6-aed1-7f9488a4e9c8-config-volume\") pod \"coredns-76f75df574-42msn\" (UID: \"770f4569-8644-42a6-aed1-7f9488a4e9c8\") " pod="kube-system/coredns-76f75df574-42msn" Dec 13 14:34:25.031568 kubelet[2545]: I1213 14:34:24.637189 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4b4e8915-4b2a-48a5-91fb-774965519f12-calico-apiserver-certs\") pod \"calico-apiserver-7947c94f84-cbvjc\" (UID: \"4b4e8915-4b2a-48a5-91fb-774965519f12\") " pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" Dec 13 14:34:25.031568 kubelet[2545]: I1213 14:34:24.637220 2545 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbpcz\" (UniqueName: \"kubernetes.io/projected/6c319a59-355a-430d-9659-bcc56212a666-kube-api-access-vbpcz\") pod \"calico-apiserver-7947c94f84-ndlwz\" (UID: \"6c319a59-355a-430d-9659-bcc56212a666\") " pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" Dec 13 14:34:24.596616 systemd[1]: Created slice kubepods-besteffort-podbf4f0892_5d28_438d_92c6_aebba7f22e3b.slice. Dec 13 14:34:24.606219 systemd[1]: Created slice kubepods-besteffort-pod4b4e8915_4b2a_48a5_91fb_774965519f12.slice. Dec 13 14:34:24.614020 systemd[1]: Created slice kubepods-besteffort-pod6c319a59_355a_430d_9659_bcc56212a666.slice. Dec 13 14:34:25.331477 env[1409]: time="2024-12-13T14:34:25.331428979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ph6vh,Uid:f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33,Namespace:kube-system,Attempt:0,}" Dec 13 14:34:25.334807 env[1409]: time="2024-12-13T14:34:25.334758391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-cbvjc,Uid:4b4e8915-4b2a-48a5-91fb-774965519f12,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:34:25.335556 env[1409]: time="2024-12-13T14:34:25.335527594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cc5579557-nhcjh,Uid:bf4f0892-5d28-438d-92c6-aebba7f22e3b,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:25.335810 env[1409]: time="2024-12-13T14:34:25.335767195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-42msn,Uid:770f4569-8644-42a6-aed1-7f9488a4e9c8,Namespace:kube-system,Attempt:0,}" Dec 13 14:34:25.336014 env[1409]: time="2024-12-13T14:34:25.335986996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-ndlwz,Uid:6c319a59-355a-430d-9659-bcc56212a666,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:34:26.049024 systemd[1]: Created slice kubepods-besteffort-poddcc90994_ebda_4270_b0cd_139697d3f962.slice. Dec 13 14:34:26.051747 env[1409]: time="2024-12-13T14:34:26.051708294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-527d7,Uid:dcc90994-ebda-4270-b0cd-139697d3f962,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:26.144339 env[1409]: time="2024-12-13T14:34:26.144280028Z" level=info msg="shim disconnected" id=9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752 Dec 13 14:34:26.144339 env[1409]: time="2024-12-13T14:34:26.144333728Z" level=warning msg="cleaning up after shim disconnected" id=9ac6885c4d1c80ec2fd1baea23f191d157fe442bdd9fd4ce7170f6f8caaac752 namespace=k8s.io Dec 13 14:34:26.144339 env[1409]: time="2024-12-13T14:34:26.144344428Z" level=info msg="cleaning up dead shim" Dec 13 14:34:26.153533 env[1409]: time="2024-12-13T14:34:26.153482561Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3360 runtime=io.containerd.runc.v2\n" Dec 13 14:34:26.181939 env[1409]: time="2024-12-13T14:34:26.181044760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:34:26.603984 env[1409]: time="2024-12-13T14:34:26.603895182Z" level=error msg="Failed to destroy network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.604611 env[1409]: time="2024-12-13T14:34:26.604559785Z" level=error msg="encountered an error cleaning up failed sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.604823 env[1409]: time="2024-12-13T14:34:26.604767185Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cc5579557-nhcjh,Uid:bf4f0892-5d28-438d-92c6-aebba7f22e3b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.605319 kubelet[2545]: E1213 14:34:26.605277 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.605695 kubelet[2545]: E1213 14:34:26.605383 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" Dec 13 14:34:26.605695 kubelet[2545]: E1213 14:34:26.605428 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" Dec 13 14:34:26.605695 kubelet[2545]: E1213 14:34:26.605526 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5cc5579557-nhcjh_calico-system(bf4f0892-5d28-438d-92c6-aebba7f22e3b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5cc5579557-nhcjh_calico-system(bf4f0892-5d28-438d-92c6-aebba7f22e3b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" podUID="bf4f0892-5d28-438d-92c6-aebba7f22e3b" Dec 13 14:34:26.618812 env[1409]: time="2024-12-13T14:34:26.618744936Z" level=error msg="Failed to destroy network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.619295 env[1409]: time="2024-12-13T14:34:26.619250238Z" level=error msg="encountered an error cleaning up failed sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.619467 env[1409]: time="2024-12-13T14:34:26.619433138Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ph6vh,Uid:f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.620045 kubelet[2545]: E1213 14:34:26.619782 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.620045 kubelet[2545]: E1213 14:34:26.619872 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-ph6vh" Dec 13 14:34:26.620045 kubelet[2545]: E1213 14:34:26.619904 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-ph6vh" Dec 13 14:34:26.620248 kubelet[2545]: E1213 14:34:26.619975 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-ph6vh_kube-system(f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-ph6vh_kube-system(f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-ph6vh" podUID="f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33" Dec 13 14:34:26.643313 env[1409]: time="2024-12-13T14:34:26.643257324Z" level=error msg="Failed to destroy network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.643689 env[1409]: time="2024-12-13T14:34:26.643643125Z" level=error msg="encountered an error cleaning up failed sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.643814 env[1409]: time="2024-12-13T14:34:26.643713426Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-cbvjc,Uid:4b4e8915-4b2a-48a5-91fb-774965519f12,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.643986 kubelet[2545]: E1213 14:34:26.643966 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.644078 kubelet[2545]: E1213 14:34:26.644041 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" Dec 13 14:34:26.644078 kubelet[2545]: E1213 14:34:26.644069 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" Dec 13 14:34:26.644188 kubelet[2545]: E1213 14:34:26.644150 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7947c94f84-cbvjc_calico-apiserver(4b4e8915-4b2a-48a5-91fb-774965519f12)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7947c94f84-cbvjc_calico-apiserver(4b4e8915-4b2a-48a5-91fb-774965519f12)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" podUID="4b4e8915-4b2a-48a5-91fb-774965519f12" Dec 13 14:34:26.660802 env[1409]: time="2024-12-13T14:34:26.660745687Z" level=error msg="Failed to destroy network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.661116 env[1409]: time="2024-12-13T14:34:26.661079188Z" level=error msg="encountered an error cleaning up failed sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.661214 env[1409]: time="2024-12-13T14:34:26.661137388Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-42msn,Uid:770f4569-8644-42a6-aed1-7f9488a4e9c8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.661367 kubelet[2545]: E1213 14:34:26.661336 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.661460 kubelet[2545]: E1213 14:34:26.661388 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-42msn" Dec 13 14:34:26.661460 kubelet[2545]: E1213 14:34:26.661420 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-42msn" Dec 13 14:34:26.661548 kubelet[2545]: E1213 14:34:26.661485 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-42msn_kube-system(770f4569-8644-42a6-aed1-7f9488a4e9c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-42msn_kube-system(770f4569-8644-42a6-aed1-7f9488a4e9c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-42msn" podUID="770f4569-8644-42a6-aed1-7f9488a4e9c8" Dec 13 14:34:26.667730 env[1409]: time="2024-12-13T14:34:26.667689012Z" level=error msg="Failed to destroy network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.667907 env[1409]: time="2024-12-13T14:34:26.667866413Z" level=error msg="Failed to destroy network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.668282 env[1409]: time="2024-12-13T14:34:26.668241514Z" level=error msg="encountered an error cleaning up failed sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.668418 env[1409]: time="2024-12-13T14:34:26.668382814Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-527d7,Uid:dcc90994-ebda-4270-b0cd-139697d3f962,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.668636 kubelet[2545]: E1213 14:34:26.668615 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.668753 kubelet[2545]: E1213 14:34:26.668669 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:26.668753 kubelet[2545]: E1213 14:34:26.668698 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-527d7" Dec 13 14:34:26.670006 kubelet[2545]: E1213 14:34:26.668760 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-527d7_calico-system(dcc90994-ebda-4270-b0cd-139697d3f962)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-527d7_calico-system(dcc90994-ebda-4270-b0cd-139697d3f962)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:26.670006 kubelet[2545]: E1213 14:34:26.669224 2545 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.670006 kubelet[2545]: E1213 14:34:26.669266 2545 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" Dec 13 14:34:26.670186 env[1409]: time="2024-12-13T14:34:26.668988117Z" level=error msg="encountered an error cleaning up failed sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.670186 env[1409]: time="2024-12-13T14:34:26.669066217Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-ndlwz,Uid:6c319a59-355a-430d-9659-bcc56212a666,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:26.670271 kubelet[2545]: E1213 14:34:26.669291 2545 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" Dec 13 14:34:26.670271 kubelet[2545]: E1213 14:34:26.669339 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7947c94f84-ndlwz_calico-apiserver(6c319a59-355a-430d-9659-bcc56212a666)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7947c94f84-ndlwz_calico-apiserver(6c319a59-355a-430d-9659-bcc56212a666)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" podUID="6c319a59-355a-430d-9659-bcc56212a666" Dec 13 14:34:27.182456 kubelet[2545]: I1213 14:34:27.182422 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:27.183329 env[1409]: time="2024-12-13T14:34:27.183285662Z" level=info msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" Dec 13 14:34:27.184682 kubelet[2545]: I1213 14:34:27.184620 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:27.185216 env[1409]: time="2024-12-13T14:34:27.185176769Z" level=info msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" Dec 13 14:34:27.186829 kubelet[2545]: I1213 14:34:27.186542 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:27.187414 env[1409]: time="2024-12-13T14:34:27.187385277Z" level=info msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" Dec 13 14:34:27.189812 kubelet[2545]: I1213 14:34:27.189431 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:27.190167 env[1409]: time="2024-12-13T14:34:27.190141287Z" level=info msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" Dec 13 14:34:27.191975 kubelet[2545]: I1213 14:34:27.191636 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:27.193440 kubelet[2545]: I1213 14:34:27.193114 2545 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:27.195113 env[1409]: time="2024-12-13T14:34:27.192277794Z" level=info msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" Dec 13 14:34:27.195279 env[1409]: time="2024-12-13T14:34:27.193620199Z" level=info msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" Dec 13 14:34:27.298007 env[1409]: time="2024-12-13T14:34:27.297938671Z" level=error msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" failed" error="failed to destroy network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.298313 kubelet[2545]: E1213 14:34:27.298280 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:27.298420 kubelet[2545]: E1213 14:34:27.298383 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4"} Dec 13 14:34:27.298472 kubelet[2545]: E1213 14:34:27.298433 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c319a59-355a-430d-9659-bcc56212a666\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.298572 kubelet[2545]: E1213 14:34:27.298473 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c319a59-355a-430d-9659-bcc56212a666\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" podUID="6c319a59-355a-430d-9659-bcc56212a666" Dec 13 14:34:27.324636 env[1409]: time="2024-12-13T14:34:27.324569566Z" level=error msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" failed" error="failed to destroy network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.325096 kubelet[2545]: E1213 14:34:27.325058 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:27.325207 kubelet[2545]: E1213 14:34:27.325115 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44"} Dec 13 14:34:27.325207 kubelet[2545]: E1213 14:34:27.325165 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bf4f0892-5d28-438d-92c6-aebba7f22e3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.325207 kubelet[2545]: E1213 14:34:27.325203 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bf4f0892-5d28-438d-92c6-aebba7f22e3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" podUID="bf4f0892-5d28-438d-92c6-aebba7f22e3b" Dec 13 14:34:27.330768 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a-shm.mount: Deactivated successfully. Dec 13 14:34:27.330898 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922-shm.mount: Deactivated successfully. Dec 13 14:34:27.330970 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44-shm.mount: Deactivated successfully. Dec 13 14:34:27.338601 env[1409]: time="2024-12-13T14:34:27.338542116Z" level=error msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" failed" error="failed to destroy network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.339138 kubelet[2545]: E1213 14:34:27.338978 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:27.339138 kubelet[2545]: E1213 14:34:27.339024 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144"} Dec 13 14:34:27.339138 kubelet[2545]: E1213 14:34:27.339072 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dcc90994-ebda-4270-b0cd-139697d3f962\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.339138 kubelet[2545]: E1213 14:34:27.339109 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dcc90994-ebda-4270-b0cd-139697d3f962\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-527d7" podUID="dcc90994-ebda-4270-b0cd-139697d3f962" Dec 13 14:34:27.343498 env[1409]: time="2024-12-13T14:34:27.343434733Z" level=error msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" failed" error="failed to destroy network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.343704 kubelet[2545]: E1213 14:34:27.343676 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:27.343818 kubelet[2545]: E1213 14:34:27.343720 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922"} Dec 13 14:34:27.343818 kubelet[2545]: E1213 14:34:27.343778 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.343962 kubelet[2545]: E1213 14:34:27.343827 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-ph6vh" podUID="f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33" Dec 13 14:34:27.352568 env[1409]: time="2024-12-13T14:34:27.352521666Z" level=error msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" failed" error="failed to destroy network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.352919 kubelet[2545]: E1213 14:34:27.352900 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:27.353023 kubelet[2545]: E1213 14:34:27.352940 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a"} Dec 13 14:34:27.353023 kubelet[2545]: E1213 14:34:27.352986 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b4e8915-4b2a-48a5-91fb-774965519f12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.353224 kubelet[2545]: E1213 14:34:27.353025 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b4e8915-4b2a-48a5-91fb-774965519f12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" podUID="4b4e8915-4b2a-48a5-91fb-774965519f12" Dec 13 14:34:27.361836 env[1409]: time="2024-12-13T14:34:27.361773299Z" level=error msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" failed" error="failed to destroy network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:34:27.362210 kubelet[2545]: E1213 14:34:27.362052 2545 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:27.362210 kubelet[2545]: E1213 14:34:27.362091 2545 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b"} Dec 13 14:34:27.362210 kubelet[2545]: E1213 14:34:27.362136 2545 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"770f4569-8644-42a6-aed1-7f9488a4e9c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:34:27.362210 kubelet[2545]: E1213 14:34:27.362174 2545 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"770f4569-8644-42a6-aed1-7f9488a4e9c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-42msn" podUID="770f4569-8644-42a6-aed1-7f9488a4e9c8" Dec 13 14:34:32.783985 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2906578039.mount: Deactivated successfully. Dec 13 14:34:32.831292 env[1409]: time="2024-12-13T14:34:32.831240884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:32.840076 env[1409]: time="2024-12-13T14:34:32.840025315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:32.843156 env[1409]: time="2024-12-13T14:34:32.843119425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:32.848051 env[1409]: time="2024-12-13T14:34:32.848011442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:32.848469 env[1409]: time="2024-12-13T14:34:32.848440743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:34:32.867176 env[1409]: time="2024-12-13T14:34:32.867138907Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:34:32.903709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4215215276.mount: Deactivated successfully. Dec 13 14:34:32.918409 env[1409]: time="2024-12-13T14:34:32.918357282Z" level=info msg="CreateContainer within sandbox \"bfbbce96f81f99b62f1c4d6f70dafb9cc190fee182a1226f22c2f05a026f10fa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec\"" Dec 13 14:34:32.920472 env[1409]: time="2024-12-13T14:34:32.918913184Z" level=info msg="StartContainer for \"dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec\"" Dec 13 14:34:32.943688 systemd[1]: Started cri-containerd-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec.scope. Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.966663 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:34:32.966772 kernel: audit: type=1400 audit(1734100472.961:1013): avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.998443 kernel: audit: type=1300 audit(1734100472.961:1013): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f9622a8ac38 items=0 ppid=3114 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.961000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f9622a8ac38 items=0 ppid=3114 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464356532326638386262623963356531373237326632313430363937 Dec 13 14:34:33.018689 kernel: audit: type=1327 audit(1734100472.961:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464356532326638386262623963356531373237326632313430363937 Dec 13 14:34:33.032133 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.039189 env[1409]: time="2024-12-13T14:34:33.039147094Z" level=info msg="StartContainer for \"dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec\" returns successfully" Dec 13 14:34:33.045571 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.061828 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.089611 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.089824 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.107915 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:33.120896 kernel: audit: type=1400 audit(1734100472.961:1014): avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit: BPF prog-id=134 op=LOAD Dec 13 14:34:32.961000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000383c58 items=0 ppid=3114 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464356532326638386262623963356531373237326632313430363937 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit: BPF prog-id=135 op=LOAD Dec 13 14:34:32.961000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000383ca8 items=0 ppid=3114 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464356532326638386262623963356531373237326632313430363937 Dec 13 14:34:32.961000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:34:32.961000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:32.961000 audit: BPF prog-id=136 op=LOAD Dec 13 14:34:32.961000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000383d38 items=0 ppid=3114 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464356532326638386262623963356531373237326632313430363937 Dec 13 14:34:33.183059 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:34:33.183180 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:34:33.231983 kubelet[2545]: I1213 14:34:33.231241 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rl66j" podStartSLOduration=2.477524655 podStartE2EDuration="23.231173846s" podCreationTimestamp="2024-12-13 14:34:10 +0000 UTC" firstStartedPulling="2024-12-13 14:34:12.095107653 +0000 UTC m=+24.187273405" lastFinishedPulling="2024-12-13 14:34:32.848756844 +0000 UTC m=+44.940922596" observedRunningTime="2024-12-13 14:34:33.231174546 +0000 UTC m=+45.323340398" watchObservedRunningTime="2024-12-13 14:34:33.231173846 +0000 UTC m=+45.323339698" Dec 13 14:34:34.231310 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.pqaoL7.mount: Deactivated successfully. Dec 13 14:34:34.508000 audit[3849]: AVC avc: denied { write } for pid=3849 comm="tee" name="fd" dev="proc" ino=29432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.508000 audit[3849]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd45aaa08 a2=241 a3=1b6 items=1 ppid=3805 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.508000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:34:34.508000 audit: PATH item=0 name="/dev/fd/63" inode=29422 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.508000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.517000 audit[3851]: AVC avc: denied { write } for pid=3851 comm="tee" name="fd" dev="proc" ino=30830 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.517000 audit[3851]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5ea7aa08 a2=241 a3=1b6 items=1 ppid=3807 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.517000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:34:34.517000 audit: PATH item=0 name="/dev/fd/63" inode=29423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.537000 audit[3856]: AVC avc: denied { write } for pid=3856 comm="tee" name="fd" dev="proc" ino=29440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.537000 audit[3854]: AVC avc: denied { write } for pid=3854 comm="tee" name="fd" dev="proc" ino=29443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.537000 audit[3854]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff143599f9 a2=241 a3=1b6 items=1 ppid=3811 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.537000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:34:34.537000 audit: PATH item=0 name="/dev/fd/63" inode=29426 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.546000 audit[3872]: AVC avc: denied { write } for pid=3872 comm="tee" name="fd" dev="proc" ino=29453 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.546000 audit[3872]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffab1109f8 a2=241 a3=1b6 items=1 ppid=3820 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.546000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:34:34.546000 audit: PATH item=0 name="/dev/fd/63" inode=29436 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.537000 audit[3856]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc154aa09 a2=241 a3=1b6 items=1 ppid=3809 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.537000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:34:34.537000 audit: PATH item=0 name="/dev/fd/63" inode=29429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.562000 audit[3880]: AVC avc: denied { write } for pid=3880 comm="tee" name="fd" dev="proc" ino=29457 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.562000 audit[3880]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3a1f4a08 a2=241 a3=1b6 items=1 ppid=3814 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.562000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:34:34.562000 audit: PATH item=0 name="/dev/fd/63" inode=29450 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.566000 audit[3876]: AVC avc: denied { write } for pid=3876 comm="tee" name="fd" dev="proc" ino=30839 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:34:34.566000 audit[3876]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8270aa0a a2=241 a3=1b6 items=1 ppid=3824 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.566000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:34:34.566000 audit: PATH item=0 name="/dev/fd/63" inode=29447 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:34.566000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.737000 audit: BPF prog-id=137 op=LOAD Dec 13 14:34:34.737000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe39343150 a2=98 a3=3 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.737000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.738000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit: BPF prog-id=138 op=LOAD Dec 13 14:34:34.738000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe39342f30 a2=74 a3=540051 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.738000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.738000 audit: BPF prog-id=139 op=LOAD Dec 13 14:34:34.738000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe39342f60 a2=94 a3=2 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.738000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit: BPF prog-id=140 op=LOAD Dec 13 14:34:34.884000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe39342e20 a2=40 a3=1 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.884000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:34:34.884000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.884000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe39342ef0 a2=50 a3=7ffe39342fd0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.884000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342e30 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe39342e60 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe39342d70 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342e80 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342e60 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342e50 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342e80 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe39342e60 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe39342e80 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe39342e50 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.894000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.894000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe39342ec0 a2=28 a3=0 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.894000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe39342c70 a2=50 a3=1 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit: BPF prog-id=141 op=LOAD Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe39342c70 a2=94 a3=5 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe39342d20 a2=50 a3=1 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe39342e40 a2=4 a3=38 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { confidentiality } for pid=3898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe39342e90 a2=94 a3=6 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { confidentiality } for pid=3898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe39342640 a2=94 a3=83 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.895000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe39342640 a2=94 a3=83 items=0 ppid=3806 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.895000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.904000 audit: BPF prog-id=142 op=LOAD Dec 13 14:34:34.904000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc774f5310 a2=98 a3=1999999999999999 items=0 ppid=3806 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.904000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:34.905000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit: BPF prog-id=143 op=LOAD Dec 13 14:34:34.905000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc774f51f0 a2=74 a3=ffff items=0 ppid=3806 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.905000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:34.905000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.905000 audit: BPF prog-id=144 op=LOAD Dec 13 14:34:34.905000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc774f5230 a2=40 a3=7ffc774f5410 items=0 ppid=3806 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.905000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:34.905000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.982669 systemd-networkd[1560]: vxlan.calico: Link UP Dec 13 14:34:34.982685 systemd-networkd[1560]: vxlan.calico: Gained carrier Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.980000 audit: BPF prog-id=145 op=LOAD Dec 13 14:34:34.980000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1069d790 a2=98 a3=ffffffff items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit: BPF prog-id=146 op=LOAD Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1069d5a0 a2=74 a3=540051 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit: BPF prog-id=147 op=LOAD Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1069d5d0 a2=94 a3=2 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d4a0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1069d4d0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1069d3e0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d4f0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d4d0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d4c0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d4f0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1069d4d0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1069d4f0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1069d4c0 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1069d530 a2=28 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.984000 audit: BPF prog-id=148 op=LOAD Dec 13 14:34:34.984000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1069d3a0 a2=40 a3=0 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.985000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe1069d390 a2=50 a3=2800 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe1069d390 a2=50 a3=2800 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.985000 audit: BPF prog-id=149 op=LOAD Dec 13 14:34:34.985000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1069cbb0 a2=94 a3=2 items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.986000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.986000 audit: BPF prog-id=150 op=LOAD Dec 13 14:34:34.986000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1069ccb0 a2=94 a3=2d items=0 ppid=3806 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit: BPF prog-id=151 op=LOAD Dec 13 14:34:34.993000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc354e2770 a2=98 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:34.993000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit: BPF prog-id=152 op=LOAD Dec 13 14:34:34.993000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc354e2550 a2=74 a3=540051 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:34.993000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:34.993000 audit: BPF prog-id=153 op=LOAD Dec 13 14:34:34.993000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc354e2580 a2=94 a3=2 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:34.993000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit: BPF prog-id=154 op=LOAD Dec 13 14:34:35.124000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc354e2440 a2=40 a3=1 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.124000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:34:35.124000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.124000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc354e2510 a2=50 a3=7ffc354e25f0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.124000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e2450 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc354e2480 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc354e2390 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e24a0 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e2480 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e2470 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e24a0 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc354e2480 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc354e24a0 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc354e2470 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc354e24e0 a2=28 a3=0 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc354e2290 a2=50 a3=1 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.134000 audit: BPF prog-id=155 op=LOAD Dec 13 14:34:35.134000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc354e2290 a2=94 a3=5 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.134000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.135000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc354e2340 a2=50 a3=1 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc354e2460 a2=4 a3=38 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { confidentiality } for pid=3952 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:35.135000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc354e24b0 a2=94 a3=6 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { confidentiality } for pid=3952 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:35.135000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc354e1c60 a2=94 a3=83 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.135000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc354e1c60 a2=94 a3=83 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.135000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.136000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.136000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc354e36a0 a2=10 a3=f1f00800 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.136000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.136000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc354e3540 a2=10 a3=3 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.136000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.136000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc354e34e0 a2=10 a3=3 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.136000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:35.136000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc354e34e0 a2=10 a3=7 items=0 ppid=3806 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:34:35.150000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:34:35.236000 audit[3982]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:35.236000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd1d13f2c0 a2=0 a3=7ffd1d13f2ac items=0 ppid=3806 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.236000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:35.250000 audit[3977]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3977 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:35.251000 audit[3978]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3978 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:35.250000 audit[3977]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff96594100 a2=0 a3=7fff965940ec items=0 ppid=3806 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.251000 audit[3978]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe86ec8ab0 a2=0 a3=55c4716ae000 items=0 ppid=3806 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.251000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:35.250000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:35.259000 audit[3980]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3980 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:35.259000 audit[3980]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc79377210 a2=0 a3=7ffc793771fc items=0 ppid=3806 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.259000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:36.205991 systemd-networkd[1560]: vxlan.calico: Gained IPv6LL Dec 13 14:34:38.044680 env[1409]: time="2024-12-13T14:34:38.044630023Z" level=info msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.090 [INFO][4008] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.090 [INFO][4008] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" iface="eth0" netns="/var/run/netns/cni-43026968-fb4b-d187-d568-30bda048ea68" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.091 [INFO][4008] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" iface="eth0" netns="/var/run/netns/cni-43026968-fb4b-d187-d568-30bda048ea68" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.092 [INFO][4008] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" iface="eth0" netns="/var/run/netns/cni-43026968-fb4b-d187-d568-30bda048ea68" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.093 [INFO][4008] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.093 [INFO][4008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.115 [INFO][4014] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.115 [INFO][4014] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.115 [INFO][4014] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.120 [WARNING][4014] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.120 [INFO][4014] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.121 [INFO][4014] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:38.124529 env[1409]: 2024-12-13 14:34:38.123 [INFO][4008] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:38.127991 systemd[1]: run-netns-cni\x2d43026968\x2dfb4b\x2dd187\x2dd568\x2d30bda048ea68.mount: Deactivated successfully. Dec 13 14:34:38.129524 env[1409]: time="2024-12-13T14:34:38.129477400Z" level=info msg="TearDown network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" successfully" Dec 13 14:34:38.129524 env[1409]: time="2024-12-13T14:34:38.129518600Z" level=info msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" returns successfully" Dec 13 14:34:38.130368 env[1409]: time="2024-12-13T14:34:38.130333603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cc5579557-nhcjh,Uid:bf4f0892-5d28-438d-92c6-aebba7f22e3b,Namespace:calico-system,Attempt:1,}" Dec 13 14:34:38.302993 systemd-networkd[1560]: cali4d71e1fd306: Link UP Dec 13 14:34:38.314982 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:38.315086 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d71e1fd306: link becomes ready Dec 13 14:34:38.317279 systemd-networkd[1560]: cali4d71e1fd306: Gained carrier Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.237 [INFO][4021] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0 calico-kube-controllers-5cc5579557- calico-system bf4f0892-5d28-438d-92c6-aebba7f22e3b 791 0 2024-12-13 14:34:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5cc5579557 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 calico-kube-controllers-5cc5579557-nhcjh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4d71e1fd306 [] []}} ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.237 [INFO][4021] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.261 [INFO][4033] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" HandleID="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.269 [INFO][4033] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" HandleID="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042dcf0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-1c166c7881", "pod":"calico-kube-controllers-5cc5579557-nhcjh", "timestamp":"2024-12-13 14:34:38.261295931 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.269 [INFO][4033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.269 [INFO][4033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.270 [INFO][4033] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.271 [INFO][4033] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.274 [INFO][4033] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.277 [INFO][4033] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.278 [INFO][4033] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.279 [INFO][4033] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.279 [INFO][4033] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.281 [INFO][4033] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3 Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.285 [INFO][4033] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.293 [INFO][4033] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.65/26] block=192.168.63.64/26 handle="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.293 [INFO][4033] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.65/26] handle="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.293 [INFO][4033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:38.347858 env[1409]: 2024-12-13 14:34:38.294 [INFO][4033] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.65/26] IPv6=[] ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" HandleID="k8s-pod-network.597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.297 [INFO][4021] cni-plugin/k8s.go 386: Populated endpoint ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0", GenerateName:"calico-kube-controllers-5cc5579557-", Namespace:"calico-system", SelfLink:"", UID:"bf4f0892-5d28-438d-92c6-aebba7f22e3b", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cc5579557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"calico-kube-controllers-5cc5579557-nhcjh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d71e1fd306", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.297 [INFO][4021] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.65/32] ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.297 [INFO][4021] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4d71e1fd306 ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.317 [INFO][4021] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.317 [INFO][4021] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0", GenerateName:"calico-kube-controllers-5cc5579557-", Namespace:"calico-system", SelfLink:"", UID:"bf4f0892-5d28-438d-92c6-aebba7f22e3b", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cc5579557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3", Pod:"calico-kube-controllers-5cc5579557-nhcjh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d71e1fd306", MAC:"0a:ad:1e:be:a4:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:38.348531 env[1409]: 2024-12-13 14:34:38.334 [INFO][4021] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3" Namespace="calico-system" Pod="calico-kube-controllers-5cc5579557-nhcjh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:38.353000 audit[4051]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:38.359015 kernel: kauditd_printk_skb: 560 callbacks suppressed Dec 13 14:34:38.359104 kernel: audit: type=1325 audit(1734100478.353:1121): table=filter:104 family=2 entries=34 op=nft_register_chain pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:38.353000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcd54151a0 a2=0 a3=7ffcd541518c items=0 ppid=3806 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.387302 kernel: audit: type=1300 audit(1734100478.353:1121): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffcd54151a0 a2=0 a3=7ffcd541518c items=0 ppid=3806 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:38.399903 kernel: audit: type=1327 audit(1734100478.353:1121): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:38.403578 env[1409]: time="2024-12-13T14:34:38.403513897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:38.403728 env[1409]: time="2024-12-13T14:34:38.403590497Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:38.403728 env[1409]: time="2024-12-13T14:34:38.403620697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:38.403887 env[1409]: time="2024-12-13T14:34:38.403786398Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3 pid=4063 runtime=io.containerd.runc.v2 Dec 13 14:34:38.429942 systemd[1]: Started cri-containerd-597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3.scope. Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470973 kernel: audit: type=1400 audit(1734100478.443:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.471083 kernel: audit: type=1400 audit(1734100478.443:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.484155 kernel: audit: type=1400 audit(1734100478.443:1124): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.497280 kernel: audit: type=1400 audit(1734100478.443:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.524462 kernel: audit: type=1400 audit(1734100478.443:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.524599 kernel: audit: type=1400 audit(1734100478.443:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.537995 kernel: audit: type=1400 audit(1734100478.443:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.457000 audit: BPF prog-id=156 op=LOAD Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376463366532633337623564313061396464393937336431653531 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376463366532633337623564313061396464393937336431653531 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.460000 audit: BPF prog-id=157 op=LOAD Dec 13 14:34:38.460000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000252f0 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376463366532633337623564313061396464393937336431653531 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.470000 audit: BPF prog-id=158 op=LOAD Dec 13 14:34:38.470000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025338 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376463366532633337623564313061396464393937336431653531 Dec 13 14:34:38.483000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:34:38.483000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:38.483000 audit: BPF prog-id=159 op=LOAD Dec 13 14:34:38.483000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025748 items=0 ppid=4063 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376463366532633337623564313061396464393937336431653531 Dec 13 14:34:38.551722 env[1409]: time="2024-12-13T14:34:38.551163180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5cc5579557-nhcjh,Uid:bf4f0892-5d28-438d-92c6-aebba7f22e3b,Namespace:calico-system,Attempt:1,} returns sandbox id \"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3\"" Dec 13 14:34:38.553839 env[1409]: time="2024-12-13T14:34:38.553614788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:34:39.043982 env[1409]: time="2024-12-13T14:34:39.043859391Z" level=info msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" Dec 13 14:34:39.044560 env[1409]: time="2024-12-13T14:34:39.044503793Z" level=info msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" Dec 13 14:34:39.130581 systemd[1]: run-containerd-runc-k8s.io-597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3-runc.ooS50k.mount: Deactivated successfully. Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.120 [INFO][4123] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.120 [INFO][4123] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" iface="eth0" netns="/var/run/netns/cni-db88959a-594c-d112-c51c-c05bf0fd18b0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.121 [INFO][4123] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" iface="eth0" netns="/var/run/netns/cni-db88959a-594c-d112-c51c-c05bf0fd18b0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.121 [INFO][4123] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" iface="eth0" netns="/var/run/netns/cni-db88959a-594c-d112-c51c-c05bf0fd18b0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.121 [INFO][4123] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.121 [INFO][4123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.161 [INFO][4139] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.162 [INFO][4139] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.162 [INFO][4139] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.168 [WARNING][4139] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.168 [INFO][4139] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.172 [INFO][4139] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.175210 env[1409]: 2024-12-13 14:34:39.174 [INFO][4123] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:39.182344 env[1409]: time="2024-12-13T14:34:39.176022820Z" level=info msg="TearDown network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" successfully" Dec 13 14:34:39.182344 env[1409]: time="2024-12-13T14:34:39.176068420Z" level=info msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" returns successfully" Dec 13 14:34:39.179368 systemd[1]: run-netns-cni\x2ddb88959a\x2d594c\x2dd112\x2dc51c\x2dc05bf0fd18b0.mount: Deactivated successfully. Dec 13 14:34:39.183566 env[1409]: time="2024-12-13T14:34:39.183528944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-527d7,Uid:dcc90994-ebda-4270-b0cd-139697d3f962,Namespace:calico-system,Attempt:1,}" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.127 [INFO][4131] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.128 [INFO][4131] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" iface="eth0" netns="/var/run/netns/cni-52605517-f2a0-7507-024d-d7aea9e3ec11" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.128 [INFO][4131] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" iface="eth0" netns="/var/run/netns/cni-52605517-f2a0-7507-024d-d7aea9e3ec11" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.128 [INFO][4131] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" iface="eth0" netns="/var/run/netns/cni-52605517-f2a0-7507-024d-d7aea9e3ec11" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.128 [INFO][4131] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.128 [INFO][4131] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.187 [INFO][4140] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.187 [INFO][4140] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.187 [INFO][4140] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.195 [WARNING][4140] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.195 [INFO][4140] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.197 [INFO][4140] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.199144 env[1409]: 2024-12-13 14:34:39.198 [INFO][4131] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:39.200492 env[1409]: time="2024-12-13T14:34:39.200447499Z" level=info msg="TearDown network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" successfully" Dec 13 14:34:39.200636 env[1409]: time="2024-12-13T14:34:39.200613200Z" level=info msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" returns successfully" Dec 13 14:34:39.202393 systemd[1]: run-netns-cni\x2d52605517\x2df2a0\x2d7507\x2d024d\x2dd7aea9e3ec11.mount: Deactivated successfully. Dec 13 14:34:39.205918 env[1409]: time="2024-12-13T14:34:39.205867417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-ndlwz,Uid:6c319a59-355a-430d-9659-bcc56212a666,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:34:39.395578 systemd-networkd[1560]: cali5090325505f: Link UP Dec 13 14:34:39.401985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:39.407864 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5090325505f: link becomes ready Dec 13 14:34:39.408710 systemd-networkd[1560]: cali5090325505f: Gained carrier Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.306 [INFO][4151] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0 csi-node-driver- calico-system dcc90994-ebda-4270-b0cd-139697d3f962 799 0 2024-12-13 14:34:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 csi-node-driver-527d7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5090325505f [] []}} ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.306 [INFO][4151] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.349 [INFO][4171] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" HandleID="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.361 [INFO][4171] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" HandleID="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310b30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-1c166c7881", "pod":"csi-node-driver-527d7", "timestamp":"2024-12-13 14:34:39.349605084 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.362 [INFO][4171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.362 [INFO][4171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.362 [INFO][4171] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.363 [INFO][4171] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.367 [INFO][4171] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.371 [INFO][4171] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.373 [INFO][4171] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.375 [INFO][4171] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.375 [INFO][4171] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.376 [INFO][4171] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5 Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.381 [INFO][4171] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.391 [INFO][4171] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.66/26] block=192.168.63.64/26 handle="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.391 [INFO][4171] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.66/26] handle="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.391 [INFO][4171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.431175 env[1409]: 2024-12-13 14:34:39.391 [INFO][4171] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.66/26] IPv6=[] ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" HandleID="k8s-pod-network.4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.393 [INFO][4151] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dcc90994-ebda-4270-b0cd-139697d3f962", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"csi-node-driver-527d7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.63.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5090325505f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.393 [INFO][4151] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.66/32] ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.393 [INFO][4151] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5090325505f ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.411 [INFO][4151] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.412 [INFO][4151] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dcc90994-ebda-4270-b0cd-139697d3f962", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5", Pod:"csi-node-driver-527d7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.63.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5090325505f", MAC:"6e:7a:6c:94:3b:22", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.433157 env[1409]: 2024-12-13 14:34:39.429 [INFO][4151] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5" Namespace="calico-system" Pod="csi-node-driver-527d7" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:39.455000 audit[4193]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:39.455000 audit[4193]: SYSCALL arch=c000003e syscall=46 success=yes exit=18640 a0=3 a1=7ffe380b7e30 a2=0 a3=7ffe380b7e1c items=0 ppid=3806 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.455000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:39.487057 env[1409]: time="2024-12-13T14:34:39.486991030Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:39.487269 env[1409]: time="2024-12-13T14:34:39.487030331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:39.487269 env[1409]: time="2024-12-13T14:34:39.487056231Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:39.487269 env[1409]: time="2024-12-13T14:34:39.487212531Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5 pid=4206 runtime=io.containerd.runc.v2 Dec 13 14:34:39.494651 systemd-networkd[1560]: cali57e1c6716ee: Link UP Dec 13 14:34:39.498824 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali57e1c6716ee: link becomes ready Dec 13 14:34:39.503663 systemd-networkd[1560]: cali57e1c6716ee: Gained carrier Dec 13 14:34:39.523735 systemd[1]: Started cri-containerd-4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5.scope. Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.352 [INFO][4162] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0 calico-apiserver-7947c94f84- calico-apiserver 6c319a59-355a-430d-9659-bcc56212a666 801 0 2024-12-13 14:34:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7947c94f84 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 calico-apiserver-7947c94f84-ndlwz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali57e1c6716ee [] []}} ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.352 [INFO][4162] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.445 [INFO][4179] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" HandleID="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.457 [INFO][4179] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" HandleID="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004cc040), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-1c166c7881", "pod":"calico-apiserver-7947c94f84-ndlwz", "timestamp":"2024-12-13 14:34:39.445466995 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.457 [INFO][4179] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.457 [INFO][4179] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.457 [INFO][4179] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.460 [INFO][4179] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.467 [INFO][4179] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.470 [INFO][4179] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.472 [INFO][4179] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.473 [INFO][4179] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.474 [INFO][4179] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.476 [INFO][4179] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.481 [INFO][4179] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.489 [INFO][4179] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.67/26] block=192.168.63.64/26 handle="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.490 [INFO][4179] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.67/26] handle="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.490 [INFO][4179] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.532954 env[1409]: 2024-12-13 14:34:39.490 [INFO][4179] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.67/26] IPv6=[] ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" HandleID="k8s-pod-network.dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.491 [INFO][4162] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c319a59-355a-430d-9659-bcc56212a666", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"calico-apiserver-7947c94f84-ndlwz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57e1c6716ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.491 [INFO][4162] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.67/32] ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.492 [INFO][4162] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali57e1c6716ee ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.499 [INFO][4162] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.500 [INFO][4162] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c319a59-355a-430d-9659-bcc56212a666", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f", Pod:"calico-apiserver-7947c94f84-ndlwz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57e1c6716ee", MAC:"be:52:b9:9b:e0:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.534289 env[1409]: 2024-12-13 14:34:39.531 [INFO][4162] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-ndlwz" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:39.557504 env[1409]: time="2024-12-13T14:34:39.557347659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:39.557504 env[1409]: time="2024-12-13T14:34:39.557380059Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:39.557504 env[1409]: time="2024-12-13T14:34:39.557391759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:39.557823 env[1409]: time="2024-12-13T14:34:39.557536060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f pid=4251 runtime=io.containerd.runc.v2 Dec 13 14:34:39.569000 audit[4260]: NETFILTER_CFG table=filter:106 family=2 entries=54 op=nft_register_chain pid=4260 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:39.569000 audit[4260]: SYSCALL arch=c000003e syscall=46 success=yes exit=28720 a0=3 a1=7ffef0196960 a2=0 a3=7ffef019694c items=0 ppid=3806 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.569000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:39.570263 systemd[1]: Started cri-containerd-dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f.scope. Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.581000 audit: BPF prog-id=160 op=LOAD Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4206 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306139303731333066393833383930386539643333376131666134 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4206 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306139303731333066393833383930386539643333376131666134 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit: BPF prog-id=161 op=LOAD Dec 13 14:34:39.582000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00020f1d0 items=0 ppid=4206 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306139303731333066393833383930386539643333376131666134 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit: BPF prog-id=162 op=LOAD Dec 13 14:34:39.582000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00020f218 items=0 ppid=4206 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306139303731333066393833383930386539643333376131666134 Dec 13 14:34:39.582000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:34:39.582000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { perfmon } for pid=4218 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit[4218]: AVC avc: denied { bpf } for pid=4218 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.582000 audit: BPF prog-id=163 op=LOAD Dec 13 14:34:39.582000 audit[4218]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00020f628 items=0 ppid=4206 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306139303731333066393833383930386539643333376131666134 Dec 13 14:34:39.604250 env[1409]: time="2024-12-13T14:34:39.604198411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-527d7,Uid:dcc90994-ebda-4270-b0cd-139697d3f962,Namespace:calico-system,Attempt:1,} returns sandbox id \"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5\"" Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.608000 audit: BPF prog-id=164 op=LOAD Dec 13 14:34:39.608000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.608000 audit[4262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4251 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462636134616332356531326136653937656266333965316565303037 Dec 13 14:34:39.608000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.608000 audit[4262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4251 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462636134616332356531326136653937656266333965316565303037 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit: BPF prog-id=165 op=LOAD Dec 13 14:34:39.609000 audit[4262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038c800 items=0 ppid=4251 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462636134616332356531326136653937656266333965316565303037 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit: BPF prog-id=166 op=LOAD Dec 13 14:34:39.609000 audit[4262]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038c848 items=0 ppid=4251 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462636134616332356531326136653937656266333965316565303037 Dec 13 14:34:39.609000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:34:39.609000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:39.609000 audit: BPF prog-id=167 op=LOAD Dec 13 14:34:39.609000 audit[4262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038cc58 items=0 ppid=4251 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462636134616332356531326136653937656266333965316565303037 Dec 13 14:34:39.639873 env[1409]: time="2024-12-13T14:34:39.639834427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-ndlwz,Uid:6c319a59-355a-430d-9659-bcc56212a666,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f\"" Dec 13 14:34:39.790136 systemd-networkd[1560]: cali4d71e1fd306: Gained IPv6LL Dec 13 14:34:40.044756 env[1409]: time="2024-12-13T14:34:40.044670442Z" level=info msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" Dec 13 14:34:40.045606 env[1409]: time="2024-12-13T14:34:40.044670342Z" level=info msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" iface="eth0" netns="/var/run/netns/cni-48f6d076-a84b-d199-98e7-3459b4fcd094" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" iface="eth0" netns="/var/run/netns/cni-48f6d076-a84b-d199-98e7-3459b4fcd094" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" iface="eth0" netns="/var/run/netns/cni-48f6d076-a84b-d199-98e7-3459b4fcd094" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.138 [INFO][4322] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.199 [INFO][4338] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.199 [INFO][4338] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.199 [INFO][4338] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.208 [WARNING][4338] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.208 [INFO][4338] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.209 [INFO][4338] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.215446 env[1409]: 2024-12-13 14:34:40.213 [INFO][4322] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:40.223280 systemd[1]: run-netns-cni\x2d48f6d076\x2da84b\x2dd199\x2d98e7\x2d3459b4fcd094.mount: Deactivated successfully. Dec 13 14:34:40.225287 env[1409]: time="2024-12-13T14:34:40.225239624Z" level=info msg="TearDown network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" successfully" Dec 13 14:34:40.225402 env[1409]: time="2024-12-13T14:34:40.225382925Z" level=info msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" returns successfully" Dec 13 14:34:40.226345 env[1409]: time="2024-12-13T14:34:40.226214427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ph6vh,Uid:f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33,Namespace:kube-system,Attempt:1,}" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" iface="eth0" netns="/var/run/netns/cni-a0abba20-6633-10c5-33e8-94205e12e515" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" iface="eth0" netns="/var/run/netns/cni-a0abba20-6633-10c5-33e8-94205e12e515" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" iface="eth0" netns="/var/run/netns/cni-a0abba20-6633-10c5-33e8-94205e12e515" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.128 [INFO][4323] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.207 [INFO][4334] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.208 [INFO][4334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.209 [INFO][4334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.227 [WARNING][4334] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.227 [INFO][4334] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.228 [INFO][4334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.238648 env[1409]: 2024-12-13 14:34:40.230 [INFO][4323] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:40.246046 systemd[1]: run-netns-cni\x2da0abba20\x2d6633\x2d10c5\x2d33e8\x2d94205e12e515.mount: Deactivated successfully. Dec 13 14:34:40.255145 env[1409]: time="2024-12-13T14:34:40.255092121Z" level=info msg="TearDown network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" successfully" Dec 13 14:34:40.255288 env[1409]: time="2024-12-13T14:34:40.255263021Z" level=info msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" returns successfully" Dec 13 14:34:40.257525 env[1409]: time="2024-12-13T14:34:40.257490728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-cbvjc,Uid:4b4e8915-4b2a-48a5-91fb-774965519f12,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:34:40.604335 systemd-networkd[1560]: calia5c8a1809c4: Link UP Dec 13 14:34:40.620320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:40.620438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia5c8a1809c4: link becomes ready Dec 13 14:34:40.622150 systemd-networkd[1560]: calia5c8a1809c4: Gained carrier Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.445 [INFO][4352] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0 calico-apiserver-7947c94f84- calico-apiserver 4b4e8915-4b2a-48a5-91fb-774965519f12 814 0 2024-12-13 14:34:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7947c94f84 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 calico-apiserver-7947c94f84-cbvjc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia5c8a1809c4 [] []}} ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.445 [INFO][4352] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.520 [INFO][4376] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" HandleID="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.530 [INFO][4376] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" HandleID="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318960), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-1c166c7881", "pod":"calico-apiserver-7947c94f84-cbvjc", "timestamp":"2024-12-13 14:34:40.520251277 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.530 [INFO][4376] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.530 [INFO][4376] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.530 [INFO][4376] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.532 [INFO][4376] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.538 [INFO][4376] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.547 [INFO][4376] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.553 [INFO][4376] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.563 [INFO][4376] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.563 [INFO][4376] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.565 [INFO][4376] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.571 [INFO][4376] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.589 [INFO][4376] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.68/26] block=192.168.63.64/26 handle="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.589 [INFO][4376] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.68/26] handle="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.589 [INFO][4376] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.643786 env[1409]: 2024-12-13 14:34:40.589 [INFO][4376] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.68/26] IPv6=[] ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" HandleID="k8s-pod-network.2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.591 [INFO][4352] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4e8915-4b2a-48a5-91fb-774965519f12", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"calico-apiserver-7947c94f84-cbvjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia5c8a1809c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.591 [INFO][4352] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.68/32] ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.591 [INFO][4352] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia5c8a1809c4 ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.623 [INFO][4352] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.623 [INFO][4352] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4e8915-4b2a-48a5-91fb-774965519f12", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f", Pod:"calico-apiserver-7947c94f84-cbvjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia5c8a1809c4", MAC:"32:03:d7:1e:07:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.644707 env[1409]: 2024-12-13 14:34:40.640 [INFO][4352] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f" Namespace="calico-apiserver" Pod="calico-apiserver-7947c94f84-cbvjc" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:40.675393 systemd-networkd[1560]: cali99977711ad3: Link UP Dec 13 14:34:40.682488 systemd-networkd[1560]: cali99977711ad3: Gained carrier Dec 13 14:34:40.682885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali99977711ad3: link becomes ready Dec 13 14:34:40.706000 audit[4404]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:40.706000 audit[4404]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7fff77258ff0 a2=0 a3=7fff77258fdc items=0 ppid=3806 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.706000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.461 [INFO][4364] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0 coredns-76f75df574- kube-system f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33 815 0 2024-12-13 14:34:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 coredns-76f75df574-ph6vh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali99977711ad3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.461 [INFO][4364] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.550 [INFO][4380] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" HandleID="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.578 [INFO][4380] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" HandleID="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000361930), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-1c166c7881", "pod":"coredns-76f75df574-ph6vh", "timestamp":"2024-12-13 14:34:40.550754375 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.578 [INFO][4380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.590 [INFO][4380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.590 [INFO][4380] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.605 [INFO][4380] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.624 [INFO][4380] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.641 [INFO][4380] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.643 [INFO][4380] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.646 [INFO][4380] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.646 [INFO][4380] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.648 [INFO][4380] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871 Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.653 [INFO][4380] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.666 [INFO][4380] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.69/26] block=192.168.63.64/26 handle="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.666 [INFO][4380] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.69/26] handle="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.666 [INFO][4380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.712405 env[1409]: 2024-12-13 14:34:40.667 [INFO][4380] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.69/26] IPv6=[] ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" HandleID="k8s-pod-network.5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.669 [INFO][4364] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"coredns-76f75df574-ph6vh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali99977711ad3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.669 [INFO][4364] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.69/32] ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.669 [INFO][4364] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali99977711ad3 ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.691 [INFO][4364] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.692 [INFO][4364] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871", Pod:"coredns-76f75df574-ph6vh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali99977711ad3", MAC:"ee:11:4a:f7:71:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.713348 env[1409]: 2024-12-13 14:34:40.709 [INFO][4364] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871" Namespace="kube-system" Pod="coredns-76f75df574-ph6vh" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:40.729046 env[1409]: time="2024-12-13T14:34:40.724763737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:40.729046 env[1409]: time="2024-12-13T14:34:40.724817137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:40.729046 env[1409]: time="2024-12-13T14:34:40.724831937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:40.729046 env[1409]: time="2024-12-13T14:34:40.724966737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f pid=4416 runtime=io.containerd.runc.v2 Dec 13 14:34:40.757752 systemd[1]: Started cri-containerd-2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f.scope. Dec 13 14:34:40.788066 env[1409]: time="2024-12-13T14:34:40.787997241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:40.788295 env[1409]: time="2024-12-13T14:34:40.788262542Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:40.788423 env[1409]: time="2024-12-13T14:34:40.788396242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:40.788733 env[1409]: time="2024-12-13T14:34:40.788659743Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871 pid=4450 runtime=io.containerd.runc.v2 Dec 13 14:34:40.788000 audit[4437]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=4437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:40.788000 audit[4437]: SYSCALL arch=c000003e syscall=46 success=yes exit=22696 a0=3 a1=7ffe435c7230 a2=0 a3=7ffe435c721c items=0 ppid=3806 pid=4437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:40.802471 systemd[1]: Started cri-containerd-5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871.scope. Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.829000 audit: BPF prog-id=168 op=LOAD Dec 13 14:34:40.830000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.830000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4416 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363836313061663833613134643934633964633636323039326165 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4416 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363836313061663833613134643934633964633636323039326165 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.831000 audit: BPF prog-id=169 op=LOAD Dec 13 14:34:40.831000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b220 items=0 ppid=4416 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363836313061663833613134643934633964633636323039326165 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.834000 audit: BPF prog-id=170 op=LOAD Dec 13 14:34:40.834000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b268 items=0 ppid=4416 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363836313061663833613134643934633964633636323039326165 Dec 13 14:34:40.835000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:34:40.835000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.835000 audit: BPF prog-id=171 op=LOAD Dec 13 14:34:40.835000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b678 items=0 ppid=4416 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233363836313061663833613134643934633964633636323039326165 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.848000 audit: BPF prog-id=172 op=LOAD Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4450 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303035303837393563656333353839653536623933366335633565 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4450 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303035303837393563656333353839653536623933366335633565 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.849000 audit: BPF prog-id=173 op=LOAD Dec 13 14:34:40.849000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c00b0 items=0 ppid=4450 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303035303837393563656333353839653536623933366335633565 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit: BPF prog-id=174 op=LOAD Dec 13 14:34:40.850000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c00f8 items=0 ppid=4450 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303035303837393563656333353839653536623933366335633565 Dec 13 14:34:40.850000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:34:40.850000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { perfmon } for pid=4462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit[4462]: AVC avc: denied { bpf } for pid=4462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:40.850000 audit: BPF prog-id=175 op=LOAD Dec 13 14:34:40.850000 audit[4462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0508 items=0 ppid=4450 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539303035303837393563656333353839653536623933366335633565 Dec 13 14:34:40.907182 env[1409]: time="2024-12-13T14:34:40.907131025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7947c94f84-cbvjc,Uid:4b4e8915-4b2a-48a5-91fb-774965519f12,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f\"" Dec 13 14:34:41.044614 env[1409]: time="2024-12-13T14:34:41.044570268Z" level=info msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" Dec 13 14:34:41.067599 env[1409]: time="2024-12-13T14:34:41.067530442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ph6vh,Uid:f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33,Namespace:kube-system,Attempt:1,} returns sandbox id \"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871\"" Dec 13 14:34:41.076402 env[1409]: time="2024-12-13T14:34:41.076351570Z" level=info msg="CreateContainer within sandbox \"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:34:41.135821 systemd-networkd[1560]: cali57e1c6716ee: Gained IPv6LL Dec 13 14:34:41.148667 env[1409]: time="2024-12-13T14:34:41.148610602Z" level=info msg="CreateContainer within sandbox \"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7ac9f3cb7bcb4b8c255c503ffe7cb3bbd51d9597b3371f41c26f60a677508517\"" Dec 13 14:34:41.150040 env[1409]: time="2024-12-13T14:34:41.150009306Z" level=info msg="StartContainer for \"7ac9f3cb7bcb4b8c255c503ffe7cb3bbd51d9597b3371f41c26f60a677508517\"" Dec 13 14:34:41.181892 systemd[1]: Started cri-containerd-7ac9f3cb7bcb4b8c255c503ffe7cb3bbd51d9597b3371f41c26f60a677508517.scope. Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.222000 audit: BPF prog-id=176 op=LOAD Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4450 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761633966336362376263623462386332353563353033666665376362 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4450 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761633966336362376263623462386332353563353033666665376362 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.227000 audit: BPF prog-id=177 op=LOAD Dec 13 14:34:41.227000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bb120 items=0 ppid=4450 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761633966336362376263623462386332353563353033666665376362 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.228000 audit: BPF prog-id=178 op=LOAD Dec 13 14:34:41.228000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bb168 items=0 ppid=4450 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761633966336362376263623462386332353563353033666665376362 Dec 13 14:34:41.229000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:34:41.229000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.229000 audit: BPF prog-id=179 op=LOAD Dec 13 14:34:41.229000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bb578 items=0 ppid=4450 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761633966336362376263623462386332353563353033666665376362 Dec 13 14:34:41.282219 env[1409]: time="2024-12-13T14:34:41.282174630Z" level=info msg="StartContainer for \"7ac9f3cb7bcb4b8c255c503ffe7cb3bbd51d9597b3371f41c26f60a677508517\" returns successfully" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.193 [INFO][4511] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.193 [INFO][4511] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" iface="eth0" netns="/var/run/netns/cni-81404505-59a8-8df6-a3d7-853f881de38e" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.194 [INFO][4511] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" iface="eth0" netns="/var/run/netns/cni-81404505-59a8-8df6-a3d7-853f881de38e" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.194 [INFO][4511] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" iface="eth0" netns="/var/run/netns/cni-81404505-59a8-8df6-a3d7-853f881de38e" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.194 [INFO][4511] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.194 [INFO][4511] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.261 [INFO][4533] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.262 [INFO][4533] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.262 [INFO][4533] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.281 [WARNING][4533] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.281 [INFO][4533] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.289 [INFO][4533] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:41.293414 env[1409]: 2024-12-13 14:34:41.291 [INFO][4511] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:41.294331 env[1409]: time="2024-12-13T14:34:41.294290969Z" level=info msg="TearDown network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" successfully" Dec 13 14:34:41.294464 env[1409]: time="2024-12-13T14:34:41.294443369Z" level=info msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" returns successfully" Dec 13 14:34:41.295127 env[1409]: time="2024-12-13T14:34:41.295100072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-42msn,Uid:770f4569-8644-42a6-aed1-7f9488a4e9c8,Namespace:kube-system,Attempt:1,}" Dec 13 14:34:41.299338 systemd[1]: run-netns-cni\x2d81404505\x2d59a8\x2d8df6\x2da3d7\x2d853f881de38e.mount: Deactivated successfully. Dec 13 14:34:41.390091 systemd-networkd[1560]: cali5090325505f: Gained IPv6LL Dec 13 14:34:41.510295 systemd-networkd[1560]: caliee3a92857b3: Link UP Dec 13 14:34:41.518530 systemd-networkd[1560]: caliee3a92857b3: Gained carrier Dec 13 14:34:41.518927 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliee3a92857b3: link becomes ready Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.415 [INFO][4560] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0 coredns-76f75df574- kube-system 770f4569-8644-42a6-aed1-7f9488a4e9c8 827 0 2024-12-13 14:34:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-1c166c7881 coredns-76f75df574-42msn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliee3a92857b3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.416 [INFO][4560] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.461 [INFO][4571] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" HandleID="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.475 [INFO][4571] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" HandleID="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033f550), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-1c166c7881", "pod":"coredns-76f75df574-42msn", "timestamp":"2024-12-13 14:34:41.461597506 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1c166c7881", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.475 [INFO][4571] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.475 [INFO][4571] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.475 [INFO][4571] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1c166c7881' Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.477 [INFO][4571] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.480 [INFO][4571] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.484 [INFO][4571] ipam/ipam.go 489: Trying affinity for 192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.486 [INFO][4571] ipam/ipam.go 155: Attempting to load block cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.488 [INFO][4571] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.64/26 host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.488 [INFO][4571] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.64/26 handle="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.490 [INFO][4571] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185 Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.495 [INFO][4571] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.63.64/26 handle="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.505 [INFO][4571] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.63.70/26] block=192.168.63.64/26 handle="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.505 [INFO][4571] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.70/26] handle="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" host="ci-3510.3.6-a-1c166c7881" Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.505 [INFO][4571] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:41.539632 env[1409]: 2024-12-13 14:34:41.505 [INFO][4571] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.63.70/26] IPv6=[] ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" HandleID="k8s-pod-network.b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.508 [INFO][4560] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"770f4569-8644-42a6-aed1-7f9488a4e9c8", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"", Pod:"coredns-76f75df574-42msn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee3a92857b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.508 [INFO][4560] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.63.70/32] ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.508 [INFO][4560] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliee3a92857b3 ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.518 [INFO][4560] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.518 [INFO][4560] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"770f4569-8644-42a6-aed1-7f9488a4e9c8", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185", Pod:"coredns-76f75df574-42msn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee3a92857b3", MAC:"c2:98:08:4e:c1:78", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:41.542973 env[1409]: 2024-12-13 14:34:41.533 [INFO][4560] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185" Namespace="kube-system" Pod="coredns-76f75df574-42msn" WorkloadEndpoint="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:41.562000 audit[4586]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=4586 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:41.562000 audit[4586]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7ffd641109f0 a2=0 a3=7ffd641109dc items=0 ppid=3806 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:41.605090 env[1409]: time="2024-12-13T14:34:41.604991265Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:41.605090 env[1409]: time="2024-12-13T14:34:41.605038666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:41.605090 env[1409]: time="2024-12-13T14:34:41.605056166Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:41.605520 env[1409]: time="2024-12-13T14:34:41.605426667Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185 pid=4599 runtime=io.containerd.runc.v2 Dec 13 14:34:41.623097 systemd[1]: Started cri-containerd-b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185.scope. Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.641000 audit: BPF prog-id=180 op=LOAD Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4599 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626336343437316239653731356235643764333638393038363937 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4599 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626336343437316239653731356235643764333638393038363937 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.643000 audit: BPF prog-id=181 op=LOAD Dec 13 14:34:41.643000 audit[4609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f47f0 items=0 ppid=4599 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626336343437316239653731356235643764333638393038363937 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.644000 audit: BPF prog-id=182 op=LOAD Dec 13 14:34:41.644000 audit[4609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f4838 items=0 ppid=4599 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626336343437316239653731356235643764333638393038363937 Dec 13 14:34:41.645000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:34:41.645000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.645000 audit: BPF prog-id=183 op=LOAD Dec 13 14:34:41.645000 audit[4609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f4c48 items=0 ppid=4599 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626336343437316239653731356235643764333638393038363937 Dec 13 14:34:41.690654 env[1409]: time="2024-12-13T14:34:41.690602440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-42msn,Uid:770f4569-8644-42a6-aed1-7f9488a4e9c8,Namespace:kube-system,Attempt:1,} returns sandbox id \"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185\"" Dec 13 14:34:41.694444 env[1409]: time="2024-12-13T14:34:41.694405552Z" level=info msg="CreateContainer within sandbox \"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:34:41.736670 env[1409]: time="2024-12-13T14:34:41.736609087Z" level=info msg="CreateContainer within sandbox \"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"80d73168ec6b81829380d91c6f68333dbd96f2fb85f9f1da0d3d5836f9340635\"" Dec 13 14:34:41.737419 env[1409]: time="2024-12-13T14:34:41.737381090Z" level=info msg="StartContainer for \"80d73168ec6b81829380d91c6f68333dbd96f2fb85f9f1da0d3d5836f9340635\"" Dec 13 14:34:41.782061 systemd[1]: Started cri-containerd-80d73168ec6b81829380d91c6f68333dbd96f2fb85f9f1da0d3d5836f9340635.scope. Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.810000 audit: BPF prog-id=184 op=LOAD Dec 13 14:34:41.811000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.811000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4599 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643733313638656336623831383239333830643931633666363833 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4599 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643733313638656336623831383239333830643931633666363833 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.812000 audit: BPF prog-id=185 op=LOAD Dec 13 14:34:41.812000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000349bc0 items=0 ppid=4599 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643733313638656336623831383239333830643931633666363833 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.813000 audit: BPF prog-id=186 op=LOAD Dec 13 14:34:41.813000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000349c08 items=0 ppid=4599 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643733313638656336623831383239333830643931633666363833 Dec 13 14:34:41.815000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:34:41.815000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.815000 audit: BPF prog-id=187 op=LOAD Dec 13 14:34:41.815000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003a6018 items=0 ppid=4599 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643733313638656336623831383239333830643931633666363833 Dec 13 14:34:41.847224 env[1409]: time="2024-12-13T14:34:41.847174642Z" level=info msg="StartContainer for \"80d73168ec6b81829380d91c6f68333dbd96f2fb85f9f1da0d3d5836f9340635\" returns successfully" Dec 13 14:34:41.860470 env[1409]: time="2024-12-13T14:34:41.860407684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:41.866154 env[1409]: time="2024-12-13T14:34:41.866114603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:41.870174 env[1409]: time="2024-12-13T14:34:41.870142616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:41.875554 env[1409]: time="2024-12-13T14:34:41.875518033Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:41.876233 env[1409]: time="2024-12-13T14:34:41.876192135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:34:41.879845 env[1409]: time="2024-12-13T14:34:41.878367242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:34:41.885538 env[1409]: time="2024-12-13T14:34:41.885503865Z" level=info msg="CreateContainer within sandbox \"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:34:41.927675 env[1409]: time="2024-12-13T14:34:41.927618000Z" level=info msg="CreateContainer within sandbox \"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6\"" Dec 13 14:34:41.928533 env[1409]: time="2024-12-13T14:34:41.928478603Z" level=info msg="StartContainer for \"4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6\"" Dec 13 14:34:41.948789 systemd[1]: Started cri-containerd-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6.scope. Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.967000 audit: BPF prog-id=188 op=LOAD Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4063 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613633626263656430306232326436306231633362343432383938 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4063 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613633626263656430306232326436306231633362343432383938 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit: BPF prog-id=189 op=LOAD Dec 13 14:34:41.968000 audit[4677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cdd00 items=0 ppid=4063 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613633626263656430306232326436306231633362343432383938 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit: BPF prog-id=190 op=LOAD Dec 13 14:34:41.968000 audit[4677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cdd48 items=0 ppid=4063 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613633626263656430306232326436306231633362343432383938 Dec 13 14:34:41.968000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:34:41.968000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { perfmon } for pid=4677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit[4677]: AVC avc: denied { bpf } for pid=4677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:41.968000 audit: BPF prog-id=191 op=LOAD Dec 13 14:34:41.968000 audit[4677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d4158 items=0 ppid=4063 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613633626263656430306232326436306231633362343432383938 Dec 13 14:34:42.007828 env[1409]: time="2024-12-13T14:34:42.007186455Z" level=info msg="StartContainer for \"4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6\" returns successfully" Dec 13 14:34:42.264000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:42.264000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00051ac60 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:42.264000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:42.265000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:42.265000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a70f30 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:42.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:42.322064 kubelet[2545]: I1213 14:34:42.322027 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-ph6vh" podStartSLOduration=42.321980158 podStartE2EDuration="42.321980158s" podCreationTimestamp="2024-12-13 14:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:42.317003542 +0000 UTC m=+54.409169294" watchObservedRunningTime="2024-12-13 14:34:42.321980158 +0000 UTC m=+54.414146010" Dec 13 14:34:42.344031 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.j1Zdn0.mount: Deactivated successfully. Dec 13 14:34:42.396000 audit[4723]: NETFILTER_CFG table=filter:110 family=2 entries=16 op=nft_register_rule pid=4723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:42.396000 audit[4723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffece9bbec0 a2=0 a3=7ffece9bbeac items=0 ppid=2723 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:42.412000 audit[4723]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:42.412000 audit[4723]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffece9bbec0 a2=0 a3=0 items=0 ppid=2723 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:42.418571 kubelet[2545]: I1213 14:34:42.418538 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-42msn" podStartSLOduration=42.418473966 podStartE2EDuration="42.418473966s" podCreationTimestamp="2024-12-13 14:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:42.402597215 +0000 UTC m=+54.494763067" watchObservedRunningTime="2024-12-13 14:34:42.418473966 +0000 UTC m=+54.510639718" Dec 13 14:34:42.437000 audit[4730]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=4730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:42.437000 audit[4730]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd520d6060 a2=0 a3=7ffd520d604c items=0 ppid=2723 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:42.442000 audit[4730]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=4730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:42.442000 audit[4730]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd520d6060 a2=0 a3=7ffd520d604c items=0 ppid=2723 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:42.446017 kubelet[2545]: I1213 14:34:42.445641 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5cc5579557-nhcjh" podStartSLOduration=29.121155999 podStartE2EDuration="32.445577152s" podCreationTimestamp="2024-12-13 14:34:10 +0000 UTC" firstStartedPulling="2024-12-13 14:34:38.552435584 +0000 UTC m=+50.644601436" lastFinishedPulling="2024-12-13 14:34:41.876856737 +0000 UTC m=+53.969022589" observedRunningTime="2024-12-13 14:34:42.422558679 +0000 UTC m=+54.514724531" watchObservedRunningTime="2024-12-13 14:34:42.445577152 +0000 UTC m=+54.537743004" Dec 13 14:34:42.670157 systemd-networkd[1560]: calia5c8a1809c4: Gained IPv6LL Dec 13 14:34:42.733975 systemd-networkd[1560]: cali99977711ad3: Gained IPv6LL Dec 13 14:34:43.067000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.067000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0079ec030 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.067000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.069000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.069000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007a85830 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.069000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.071000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.071000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007a85b30 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.071000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.076000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.076000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c007922920 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.076000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.099000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.099000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:43.099000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c007922a40 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.099000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0096be180 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:34:43.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:34:43.133989 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.0Ty988.mount: Deactivated successfully. Dec 13 14:34:43.438040 systemd-networkd[1560]: caliee3a92857b3: Gained IPv6LL Dec 13 14:34:43.464000 audit[4756]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:43.469507 env[1409]: time="2024-12-13T14:34:43.469459506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.474874 kernel: kauditd_printk_skb: 557 callbacks suppressed Dec 13 14:34:43.475000 kernel: audit: type=1325 audit(1734100483.464:1301): table=filter:114 family=2 entries=10 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:43.478432 env[1409]: time="2024-12-13T14:34:43.478392434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.464000 audit[4756]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8de3d230 a2=0 a3=7ffd8de3d21c items=0 ppid=2723 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.497354 env[1409]: time="2024-12-13T14:34:43.483838452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.497354 env[1409]: time="2024-12-13T14:34:43.490905774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:43.497354 env[1409]: time="2024-12-13T14:34:43.491458876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:34:43.497354 env[1409]: time="2024-12-13T14:34:43.493086981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:34:43.497354 env[1409]: time="2024-12-13T14:34:43.494254185Z" level=info msg="CreateContainer within sandbox \"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:34:43.502083 kernel: audit: type=1300 audit(1734100483.464:1301): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8de3d230 a2=0 a3=7ffd8de3d21c items=0 ppid=2723 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.502178 kernel: audit: type=1327 audit(1734100483.464:1301): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:43.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:43.511000 audit[4756]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:43.541345 kernel: audit: type=1325 audit(1734100483.511:1302): table=nat:115 family=2 entries=56 op=nft_register_chain pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:43.541459 kernel: audit: type=1300 audit(1734100483.511:1302): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd8de3d230 a2=0 a3=7ffd8de3d21c items=0 ppid=2723 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.511000 audit[4756]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd8de3d230 a2=0 a3=7ffd8de3d21c items=0 ppid=2723 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:43.552858 kernel: audit: type=1327 audit(1734100483.511:1302): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:43.575869 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3003919107.mount: Deactivated successfully. Dec 13 14:34:43.587387 env[1409]: time="2024-12-13T14:34:43.587335779Z" level=info msg="CreateContainer within sandbox \"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"37b29ade29af257ad24fe5f21b1c04015eac881dfe283ca9caf4ba87707db0d8\"" Dec 13 14:34:43.589300 env[1409]: time="2024-12-13T14:34:43.588116482Z" level=info msg="StartContainer for \"37b29ade29af257ad24fe5f21b1c04015eac881dfe283ca9caf4ba87707db0d8\"" Dec 13 14:34:43.618477 systemd[1]: Started cri-containerd-37b29ade29af257ad24fe5f21b1c04015eac881dfe283ca9caf4ba87707db0d8.scope. Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1ad4b15b18 items=0 ppid=4206 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.667178 kernel: audit: type=1400 audit(1734100483.634:1303): avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.667306 kernel: audit: type=1300 audit(1734100483.634:1303): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1ad4b15b18 items=0 ppid=4206 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.684949 kernel: audit: type=1327 audit(1734100483.634:1303): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623239616465323961663235376164323466653566323162316330 Dec 13 14:34:43.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623239616465323961663235376164323466653566323162316330 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.698810 kernel: audit: type=1400 audit(1734100483.634:1304): avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.634000 audit: BPF prog-id=192 op=LOAD Dec 13 14:34:43.634000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00028b598 items=0 ppid=4206 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623239616465323961663235376164323466653566323162316330 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit: BPF prog-id=193 op=LOAD Dec 13 14:34:43.635000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00028b5e8 items=0 ppid=4206 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623239616465323961663235376164323466653566323162316330 Dec 13 14:34:43.635000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:34:43.635000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:43.635000 audit: BPF prog-id=194 op=LOAD Dec 13 14:34:43.635000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00028b678 items=0 ppid=4206 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:43.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337623239616465323961663235376164323466653566323162316330 Dec 13 14:34:43.702900 env[1409]: time="2024-12-13T14:34:43.702860545Z" level=info msg="StartContainer for \"37b29ade29af257ad24fe5f21b1c04015eac881dfe283ca9caf4ba87707db0d8\" returns successfully" Dec 13 14:34:46.450965 env[1409]: time="2024-12-13T14:34:46.450910169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.458641 env[1409]: time="2024-12-13T14:34:46.458603093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.471119 env[1409]: time="2024-12-13T14:34:46.471087432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.476914 env[1409]: time="2024-12-13T14:34:46.476881650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.477346 env[1409]: time="2024-12-13T14:34:46.477314751Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:34:46.478383 env[1409]: time="2024-12-13T14:34:46.478353654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:34:46.480007 env[1409]: time="2024-12-13T14:34:46.479977459Z" level=info msg="CreateContainer within sandbox \"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:34:46.517573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount29319587.mount: Deactivated successfully. Dec 13 14:34:46.530931 env[1409]: time="2024-12-13T14:34:46.530882318Z" level=info msg="CreateContainer within sandbox \"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fa0da35a4fbbc5133a40f416b1f78190ca6e9b46f95ec9a417f57a06ef94a6fc\"" Dec 13 14:34:46.531532 env[1409]: time="2024-12-13T14:34:46.531465119Z" level=info msg="StartContainer for \"fa0da35a4fbbc5133a40f416b1f78190ca6e9b46f95ec9a417f57a06ef94a6fc\"" Dec 13 14:34:46.561650 systemd[1]: Started cri-containerd-fa0da35a4fbbc5133a40f416b1f78190ca6e9b46f95ec9a417f57a06ef94a6fc.scope. Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.581000 audit: BPF prog-id=195 op=LOAD Dec 13 14:34:46.582000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.582000 audit[4810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4251 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306461333561346662626335313333613430663431366231663738 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4251 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306461333561346662626335313333613430663431366231663738 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.583000 audit: BPF prog-id=196 op=LOAD Dec 13 14:34:46.583000 audit[4810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e6940 items=0 ppid=4251 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306461333561346662626335313333613430663431366231663738 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.584000 audit: BPF prog-id=197 op=LOAD Dec 13 14:34:46.584000 audit[4810]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e6988 items=0 ppid=4251 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306461333561346662626335313333613430663431366231663738 Dec 13 14:34:46.585000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:34:46.585000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { perfmon } for pid=4810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit[4810]: AVC avc: denied { bpf } for pid=4810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.585000 audit: BPF prog-id=198 op=LOAD Dec 13 14:34:46.585000 audit[4810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e6d98 items=0 ppid=4251 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306461333561346662626335313333613430663431366231663738 Dec 13 14:34:46.630828 env[1409]: time="2024-12-13T14:34:46.628857123Z" level=info msg="StartContainer for \"fa0da35a4fbbc5133a40f416b1f78190ca6e9b46f95ec9a417f57a06ef94a6fc\" returns successfully" Dec 13 14:34:46.824500 env[1409]: time="2024-12-13T14:34:46.824446931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.835055 env[1409]: time="2024-12-13T14:34:46.835004964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.840269 env[1409]: time="2024-12-13T14:34:46.840225080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.844571 env[1409]: time="2024-12-13T14:34:46.844540394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:46.845223 env[1409]: time="2024-12-13T14:34:46.845180496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:34:46.847367 env[1409]: time="2024-12-13T14:34:46.847342403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:34:46.850281 env[1409]: time="2024-12-13T14:34:46.850251612Z" level=info msg="CreateContainer within sandbox \"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:34:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000967120 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009671a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000967200 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.856000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.856000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b98020 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:34:46.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.902575 env[1409]: time="2024-12-13T14:34:46.902524874Z" level=info msg="CreateContainer within sandbox \"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7545ab2d8c5e877674ee0cc62c5991d25028345121bf80880267f3646d19e110\"" Dec 13 14:34:46.903341 env[1409]: time="2024-12-13T14:34:46.903305577Z" level=info msg="StartContainer for \"7545ab2d8c5e877674ee0cc62c5991d25028345121bf80880267f3646d19e110\"" Dec 13 14:34:46.925296 systemd[1]: Started cri-containerd-7545ab2d8c5e877674ee0cc62c5991d25028345121bf80880267f3646d19e110.scope. Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.956000 audit: BPF prog-id=199 op=LOAD Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4416 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343561623264386335653837373637346565306363363263353939 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4416 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343561623264386335653837373637346565306363363263353939 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit: BPF prog-id=200 op=LOAD Dec 13 14:34:46.957000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fdbd0 items=0 ppid=4416 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343561623264386335653837373637346565306363363263353939 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit: BPF prog-id=201 op=LOAD Dec 13 14:34:46.957000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fdc18 items=0 ppid=4416 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343561623264386335653837373637346565306363363263353939 Dec 13 14:34:46.957000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:34:46.957000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:46.957000 audit: BPF prog-id=202 op=LOAD Dec 13 14:34:46.957000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f0028 items=0 ppid=4416 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735343561623264386335653837373637346565306363363263353939 Dec 13 14:34:47.017919 env[1409]: time="2024-12-13T14:34:47.017867633Z" level=info msg="StartContainer for \"7545ab2d8c5e877674ee0cc62c5991d25028345121bf80880267f3646d19e110\" returns successfully" Dec 13 14:34:47.338694 kubelet[2545]: I1213 14:34:47.338645 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7947c94f84-cbvjc" podStartSLOduration=32.402802563 podStartE2EDuration="38.338582726s" podCreationTimestamp="2024-12-13 14:34:09 +0000 UTC" firstStartedPulling="2024-12-13 14:34:40.910581037 +0000 UTC m=+53.002746889" lastFinishedPulling="2024-12-13 14:34:46.8463613 +0000 UTC m=+58.938527052" observedRunningTime="2024-12-13 14:34:47.337298722 +0000 UTC m=+59.429464474" watchObservedRunningTime="2024-12-13 14:34:47.338582726 +0000 UTC m=+59.430748478" Dec 13 14:34:47.385000 audit[4879]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:47.385000 audit[4879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc11805830 a2=0 a3=7ffc1180581c items=0 ppid=2723 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:47.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:47.390000 audit[4879]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:47.390000 audit[4879]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc11805830 a2=0 a3=7ffc1180581c items=0 ppid=2723 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:47.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:47.419000 audit[4881]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:47.419000 audit[4881]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcd16d0be0 a2=0 a3=7ffcd16d0bcc items=0 ppid=2723 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:47.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:47.424000 audit[4881]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:47.424000 audit[4881]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcd16d0be0 a2=0 a3=7ffcd16d0bcc items=0 ppid=2723 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:47.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:48.060801 env[1409]: time="2024-12-13T14:34:48.060744560Z" level=info msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.150 [WARNING][4897] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871", Pod:"coredns-76f75df574-ph6vh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali99977711ad3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.151 [INFO][4897] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.151 [INFO][4897] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" iface="eth0" netns="" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.151 [INFO][4897] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.151 [INFO][4897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.225 [INFO][4903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.225 [INFO][4903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.227 [INFO][4903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.238 [WARNING][4903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.241 [INFO][4903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.243 [INFO][4903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:48.252517 env[1409]: 2024-12-13 14:34:48.245 [INFO][4897] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.253358 env[1409]: time="2024-12-13T14:34:48.253304853Z" level=info msg="TearDown network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" successfully" Dec 13 14:34:48.253475 env[1409]: time="2024-12-13T14:34:48.253455953Z" level=info msg="StopPodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" returns successfully" Dec 13 14:34:48.254074 env[1409]: time="2024-12-13T14:34:48.254045955Z" level=info msg="RemovePodSandbox for \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" Dec 13 14:34:48.254251 env[1409]: time="2024-12-13T14:34:48.254209356Z" level=info msg="Forcibly stopping sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\"" Dec 13 14:34:48.342606 kubelet[2545]: I1213 14:34:48.341015 2545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:34:48.362000 audit[4820]: AVC avc: denied { watch } for pid=4820 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.2109466111/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c145,c202 tclass=file permissive=0 Dec 13 14:34:48.362000 audit[4820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001054bc0 a2=fc6 a3=0 items=0 ppid=4251 pid=4820 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 key=(null) Dec 13 14:34:48.362000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:48.432291 kubelet[2545]: I1213 14:34:48.431255 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7947c94f84-ndlwz" podStartSLOduration=32.59445558 podStartE2EDuration="39.431187901s" podCreationTimestamp="2024-12-13 14:34:09 +0000 UTC" firstStartedPulling="2024-12-13 14:34:39.640957031 +0000 UTC m=+51.733122783" lastFinishedPulling="2024-12-13 14:34:46.477689352 +0000 UTC m=+58.569855104" observedRunningTime="2024-12-13 14:34:47.370508725 +0000 UTC m=+59.462674477" watchObservedRunningTime="2024-12-13 14:34:48.431187901 +0000 UTC m=+60.523353653" Dec 13 14:34:48.511356 kernel: kauditd_printk_skb: 180 callbacks suppressed Dec 13 14:34:48.511518 kernel: audit: type=1325 audit(1734100488.495:1354): table=filter:120 family=2 entries=9 op=nft_register_rule pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:48.495000 audit[4933]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:48.495000 audit[4933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc357d8560 a2=0 a3=7ffc357d854c items=0 ppid=2723 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.540984 kernel: audit: type=1300 audit(1734100488.495:1354): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc357d8560 a2=0 a3=7ffc357d854c items=0 ppid=2723 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:48.554823 kernel: audit: type=1327 audit(1734100488.495:1354): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:48.518000 audit[4933]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:48.568819 kernel: audit: type=1325 audit(1734100488.518:1355): table=nat:121 family=2 entries=27 op=nft_register_chain pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:48.518000 audit[4933]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc357d8560 a2=0 a3=7ffc357d854c items=0 ppid=2723 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.600781 kernel: audit: type=1300 audit(1734100488.518:1355): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc357d8560 a2=0 a3=7ffc357d854c items=0 ppid=2723 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.600902 kernel: audit: type=1327 audit(1734100488.518:1355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:48.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.447 [WARNING][4922] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"f3f9ab19-baa2-42ff-9fe0-1df5aae8ec33", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"5900508795cec3589e56b936c5c5e83bee2796699518b678a888e27a858d8871", Pod:"coredns-76f75df574-ph6vh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali99977711ad3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.448 [INFO][4922] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.448 [INFO][4922] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" iface="eth0" netns="" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.448 [INFO][4922] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.448 [INFO][4922] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.543 [INFO][4929] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.543 [INFO][4929] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.543 [INFO][4929] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.601 [WARNING][4929] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.602 [INFO][4929] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" HandleID="k8s-pod-network.94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--ph6vh-eth0" Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.605 [INFO][4929] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:48.612258 env[1409]: 2024-12-13 14:34:48.610 [INFO][4922] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922" Dec 13 14:34:48.613033 env[1409]: time="2024-12-13T14:34:48.612987360Z" level=info msg="TearDown network for sandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" successfully" Dec 13 14:34:48.623670 env[1409]: time="2024-12-13T14:34:48.623620293Z" level=info msg="RemovePodSandbox \"94df30230e29e0f0139e57ba5fbcd14073e91d2cb7306e4c2a53fc52b6b94922\" returns successfully" Dec 13 14:34:48.624549 env[1409]: time="2024-12-13T14:34:48.624512796Z" level=info msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" Dec 13 14:34:48.789103 env[1409]: time="2024-12-13T14:34:48.789055802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:48.802085 env[1409]: time="2024-12-13T14:34:48.802040242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:48.810071 env[1409]: time="2024-12-13T14:34:48.810029667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:48.819464 env[1409]: time="2024-12-13T14:34:48.819386396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:48.819760 env[1409]: time="2024-12-13T14:34:48.819721697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.746 [WARNING][4950] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c319a59-355a-430d-9659-bcc56212a666", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f", Pod:"calico-apiserver-7947c94f84-ndlwz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57e1c6716ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.748 [INFO][4950] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.748 [INFO][4950] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" iface="eth0" netns="" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.748 [INFO][4950] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.748 [INFO][4950] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.790 [INFO][4956] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.790 [INFO][4956] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.790 [INFO][4956] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.806 [WARNING][4956] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.806 [INFO][4956] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.816 [INFO][4956] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:48.821906 env[1409]: 2024-12-13 14:34:48.820 [INFO][4950] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:48.821906 env[1409]: time="2024-12-13T14:34:48.821841903Z" level=info msg="TearDown network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" successfully" Dec 13 14:34:48.822550 env[1409]: time="2024-12-13T14:34:48.821920704Z" level=info msg="StopPodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" returns successfully" Dec 13 14:34:48.822550 env[1409]: time="2024-12-13T14:34:48.822332405Z" level=info msg="RemovePodSandbox for \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" Dec 13 14:34:48.822550 env[1409]: time="2024-12-13T14:34:48.822363405Z" level=info msg="Forcibly stopping sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\"" Dec 13 14:34:48.826074 env[1409]: time="2024-12-13T14:34:48.826036116Z" level=info msg="CreateContainer within sandbox \"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:34:48.878000 audit[4857]: AVC avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:34:48.898997 kernel: audit: type=1400 audit(1734100488.878:1356): avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:34:48.878000 audit[4857]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b4c780 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:34:48.878000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:48.931597 env[1409]: time="2024-12-13T14:34:48.924512819Z" level=info msg="CreateContainer within sandbox \"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9d5277cdc6a03ab1db1749a2cb4e62c5a3da206857ea1c385ef9fc6c94b41070\"" Dec 13 14:34:48.944006 kernel: audit: type=1300 audit(1734100488.878:1356): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b4c780 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:34:48.944119 kernel: audit: type=1327 audit(1734100488.878:1356): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:48.944158 env[1409]: time="2024-12-13T14:34:48.943531378Z" level=info msg="StartContainer for \"9d5277cdc6a03ab1db1749a2cb4e62c5a3da206857ea1c385ef9fc6c94b41070\"" Dec 13 14:34:48.995634 systemd[1]: run-containerd-runc-k8s.io-9d5277cdc6a03ab1db1749a2cb4e62c5a3da206857ea1c385ef9fc6c94b41070-runc.H2v3IU.mount: Deactivated successfully. Dec 13 14:34:49.005953 systemd[1]: Started cri-containerd-9d5277cdc6a03ab1db1749a2cb4e62c5a3da206857ea1c385ef9fc6c94b41070.scope. Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:48.963 [WARNING][4976] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c319a59-355a-430d-9659-bcc56212a666", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"dbca4ac25e12a6e97ebf39e1ee007d06cc9b17a9e8cab2a1e2af1589fcf1e64f", Pod:"calico-apiserver-7947c94f84-ndlwz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali57e1c6716ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:48.963 [INFO][4976] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:48.963 [INFO][4976] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" iface="eth0" netns="" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:48.963 [INFO][4976] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:48.963 [INFO][4976] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.037 [INFO][4990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.038 [INFO][4990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.038 [INFO][4990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.045 [WARNING][4990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.045 [INFO][4990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" HandleID="k8s-pod-network.6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--ndlwz-eth0" Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.047 [INFO][4990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.049922 env[1409]: 2024-12-13 14:34:49.048 [INFO][4976] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4" Dec 13 14:34:49.050757 env[1409]: time="2024-12-13T14:34:49.050715507Z" level=info msg="TearDown network for sandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" successfully" Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f22426f95f8 items=0 ppid=4206 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353237376364633661303361623164623137343961326362346536 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.078881 kernel: audit: type=1400 audit(1734100489.062:1357): avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit: BPF prog-id=203 op=LOAD Dec 13 14:34:49.062000 audit[4989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000221778 items=0 ppid=4206 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353237376364633661303361623164623137343961326362346536 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.062000 audit: BPF prog-id=204 op=LOAD Dec 13 14:34:49.062000 audit[4989]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002217c8 items=0 ppid=4206 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353237376364633661303361623164623137343961326362346536 Dec 13 14:34:49.062000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:34:49.063000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { perfmon } for pid=4989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit[4989]: AVC avc: denied { bpf } for pid=4989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:49.063000 audit: BPF prog-id=205 op=LOAD Dec 13 14:34:49.063000 audit[4989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000221858 items=0 ppid=4206 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:49.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353237376364633661303361623164623137343961326362346536 Dec 13 14:34:49.080336 env[1409]: time="2024-12-13T14:34:49.080092097Z" level=info msg="RemovePodSandbox \"6395d9e27741a46457ae2016fefd8b95dafd6644bff0cce1b0ba71a8ff2743c4\" returns successfully" Dec 13 14:34:49.081134 env[1409]: time="2024-12-13T14:34:49.080742199Z" level=info msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" Dec 13 14:34:49.134657 env[1409]: time="2024-12-13T14:34:49.134602764Z" level=info msg="StartContainer for \"9d5277cdc6a03ab1db1749a2cb4e62c5a3da206857ea1c385ef9fc6c94b41070\" returns successfully" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.140 [WARNING][5026] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dcc90994-ebda-4270-b0cd-139697d3f962", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5", Pod:"csi-node-driver-527d7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.63.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5090325505f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.141 [INFO][5026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.141 [INFO][5026] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" iface="eth0" netns="" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.141 [INFO][5026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.141 [INFO][5026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.175 [INFO][5043] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.175 [INFO][5043] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.175 [INFO][5043] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.189 [WARNING][5043] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.189 [INFO][5043] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.192 [INFO][5043] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.195593 env[1409]: 2024-12-13 14:34:49.194 [INFO][5026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.196411 env[1409]: time="2024-12-13T14:34:49.196368953Z" level=info msg="TearDown network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" successfully" Dec 13 14:34:49.196514 env[1409]: time="2024-12-13T14:34:49.196495954Z" level=info msg="StopPodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" returns successfully" Dec 13 14:34:49.197149 env[1409]: time="2024-12-13T14:34:49.197119256Z" level=info msg="RemovePodSandbox for \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" Dec 13 14:34:49.197408 env[1409]: time="2024-12-13T14:34:49.197360556Z" level=info msg="Forcibly stopping sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\"" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.246 [WARNING][5065] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dcc90994-ebda-4270-b0cd-139697d3f962", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"4a0a907130f9838908e9d337a1fa4d25fc21dde9ba0a93982e439f553c8c70f5", Pod:"csi-node-driver-527d7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.63.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5090325505f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.246 [INFO][5065] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.247 [INFO][5065] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" iface="eth0" netns="" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.247 [INFO][5065] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.247 [INFO][5065] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.266 [INFO][5071] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.266 [INFO][5071] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.266 [INFO][5071] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.287 [WARNING][5071] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.287 [INFO][5071] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" HandleID="k8s-pod-network.a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Workload="ci--3510.3.6--a--1c166c7881-k8s-csi--node--driver--527d7-eth0" Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.289 [INFO][5071] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.291399 env[1409]: 2024-12-13 14:34:49.290 [INFO][5065] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144" Dec 13 14:34:49.292150 env[1409]: time="2024-12-13T14:34:49.291442044Z" level=info msg="TearDown network for sandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" successfully" Dec 13 14:34:49.300902 env[1409]: time="2024-12-13T14:34:49.300857373Z" level=info msg="RemovePodSandbox \"a8ca018de8e6c9c90a2956bbf38f4b2f0a271980996990e033b5aac7849bc144\" returns successfully" Dec 13 14:34:49.301395 env[1409]: time="2024-12-13T14:34:49.301365375Z" level=info msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.335 [WARNING][5089] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4e8915-4b2a-48a5-91fb-774965519f12", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f", Pod:"calico-apiserver-7947c94f84-cbvjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia5c8a1809c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.335 [INFO][5089] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.335 [INFO][5089] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" iface="eth0" netns="" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.335 [INFO][5089] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.335 [INFO][5089] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.376 [INFO][5095] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.376 [INFO][5095] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.376 [INFO][5095] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.384 [WARNING][5095] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.384 [INFO][5095] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.386 [INFO][5095] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.387919 env[1409]: 2024-12-13 14:34:49.386 [INFO][5089] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.388591 env[1409]: time="2024-12-13T14:34:49.387949040Z" level=info msg="TearDown network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" successfully" Dec 13 14:34:49.388591 env[1409]: time="2024-12-13T14:34:49.387985040Z" level=info msg="StopPodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" returns successfully" Dec 13 14:34:49.388591 env[1409]: time="2024-12-13T14:34:49.388567542Z" level=info msg="RemovePodSandbox for \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" Dec 13 14:34:49.388721 env[1409]: time="2024-12-13T14:34:49.388604342Z" level=info msg="Forcibly stopping sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\"" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.419 [WARNING][5114] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0", GenerateName:"calico-apiserver-7947c94f84-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b4e8915-4b2a-48a5-91fb-774965519f12", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7947c94f84", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"2368610af83a14d94c9dc662092aeb36c7af8b07b3fe0d14753662fd9b71ef1f", Pod:"calico-apiserver-7947c94f84-cbvjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia5c8a1809c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.419 [INFO][5114] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.419 [INFO][5114] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" iface="eth0" netns="" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.419 [INFO][5114] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.419 [INFO][5114] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.438 [INFO][5120] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.438 [INFO][5120] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.439 [INFO][5120] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.443 [WARNING][5120] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.443 [INFO][5120] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" HandleID="k8s-pod-network.07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--apiserver--7947c94f84--cbvjc-eth0" Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.445 [INFO][5120] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.448952 env[1409]: 2024-12-13 14:34:49.446 [INFO][5114] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a" Dec 13 14:34:49.450701 env[1409]: time="2024-12-13T14:34:49.448930127Z" level=info msg="TearDown network for sandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" successfully" Dec 13 14:34:49.461609 env[1409]: time="2024-12-13T14:34:49.461559765Z" level=info msg="RemovePodSandbox \"07dbf862a73e0c0fcc0016e97e3c5383a7cf384211f40d3fb25b26e26f2bb08a\" returns successfully" Dec 13 14:34:49.462243 env[1409]: time="2024-12-13T14:34:49.462206867Z" level=info msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.522 [WARNING][5139] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0", GenerateName:"calico-kube-controllers-5cc5579557-", Namespace:"calico-system", SelfLink:"", UID:"bf4f0892-5d28-438d-92c6-aebba7f22e3b", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cc5579557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3", Pod:"calico-kube-controllers-5cc5579557-nhcjh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d71e1fd306", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.522 [INFO][5139] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.522 [INFO][5139] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" iface="eth0" netns="" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.522 [INFO][5139] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.522 [INFO][5139] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.556 [INFO][5145] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.556 [INFO][5145] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.556 [INFO][5145] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.561 [WARNING][5145] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.561 [INFO][5145] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.563 [INFO][5145] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.565542 env[1409]: 2024-12-13 14:34:49.564 [INFO][5139] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.566332 env[1409]: time="2024-12-13T14:34:49.566287986Z" level=info msg="TearDown network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" successfully" Dec 13 14:34:49.566421 env[1409]: time="2024-12-13T14:34:49.566330686Z" level=info msg="StopPodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" returns successfully" Dec 13 14:34:49.566914 env[1409]: time="2024-12-13T14:34:49.566881888Z" level=info msg="RemovePodSandbox for \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" Dec 13 14:34:49.567093 env[1409]: time="2024-12-13T14:34:49.567043588Z" level=info msg="Forcibly stopping sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\"" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.600 [WARNING][5163] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0", GenerateName:"calico-kube-controllers-5cc5579557-", Namespace:"calico-system", SelfLink:"", UID:"bf4f0892-5d28-438d-92c6-aebba7f22e3b", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5cc5579557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"597dc6e2c37b5d10a9dd9973d1e51cfa8a8102f14de85f41dea7a9d1964238f3", Pod:"calico-kube-controllers-5cc5579557-nhcjh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4d71e1fd306", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.600 [INFO][5163] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.600 [INFO][5163] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" iface="eth0" netns="" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.600 [INFO][5163] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.601 [INFO][5163] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.628 [INFO][5169] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.628 [INFO][5169] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.628 [INFO][5169] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.635 [WARNING][5169] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.635 [INFO][5169] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" HandleID="k8s-pod-network.a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Workload="ci--3510.3.6--a--1c166c7881-k8s-calico--kube--controllers--5cc5579557--nhcjh-eth0" Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.636 [INFO][5169] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.639027 env[1409]: 2024-12-13 14:34:49.637 [INFO][5163] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44" Dec 13 14:34:49.639698 env[1409]: time="2024-12-13T14:34:49.639060809Z" level=info msg="TearDown network for sandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" successfully" Dec 13 14:34:49.650728 env[1409]: time="2024-12-13T14:34:49.650684645Z" level=info msg="RemovePodSandbox \"a350d5ea9177015db8e863da7e890db7bfd7902cb1ce5d2b3e1915207925cd44\" returns successfully" Dec 13 14:34:49.651249 env[1409]: time="2024-12-13T14:34:49.651220146Z" level=info msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.684 [WARNING][5187] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"770f4569-8644-42a6-aed1-7f9488a4e9c8", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185", Pod:"coredns-76f75df574-42msn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee3a92857b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.684 [INFO][5187] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.684 [INFO][5187] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" iface="eth0" netns="" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.684 [INFO][5187] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.684 [INFO][5187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.708 [INFO][5193] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.708 [INFO][5193] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.708 [INFO][5193] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.714 [WARNING][5193] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.714 [INFO][5193] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.715 [INFO][5193] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.721026 env[1409]: 2024-12-13 14:34:49.716 [INFO][5187] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.721026 env[1409]: time="2024-12-13T14:34:49.717926351Z" level=info msg="TearDown network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" successfully" Dec 13 14:34:49.721026 env[1409]: time="2024-12-13T14:34:49.717966551Z" level=info msg="StopPodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" returns successfully" Dec 13 14:34:49.721026 env[1409]: time="2024-12-13T14:34:49.719119654Z" level=info msg="RemovePodSandbox for \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" Dec 13 14:34:49.721026 env[1409]: time="2024-12-13T14:34:49.719209754Z" level=info msg="Forcibly stopping sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\"" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.758 [WARNING][5212] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"770f4569-8644-42a6-aed1-7f9488a4e9c8", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1c166c7881", ContainerID:"b9bc64471b9e715b5d7d368908697108718ab1febeed551e14f9651f887b4185", Pod:"coredns-76f75df574-42msn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee3a92857b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.759 [INFO][5212] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.759 [INFO][5212] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" iface="eth0" netns="" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.759 [INFO][5212] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.759 [INFO][5212] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.785 [INFO][5218] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.786 [INFO][5218] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.786 [INFO][5218] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.790 [WARNING][5218] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.790 [INFO][5218] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" HandleID="k8s-pod-network.df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Workload="ci--3510.3.6--a--1c166c7881-k8s-coredns--76f75df574--42msn-eth0" Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.791 [INFO][5218] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:49.793603 env[1409]: 2024-12-13 14:34:49.792 [INFO][5212] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b" Dec 13 14:34:49.794576 env[1409]: time="2024-12-13T14:34:49.793633782Z" level=info msg="TearDown network for sandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" successfully" Dec 13 14:34:49.804104 env[1409]: time="2024-12-13T14:34:49.804063714Z" level=info msg="RemovePodSandbox \"df73570278bf77766aed0c83634a443bceb0c700e4e56a2d9b2a234d25cede3b\" returns successfully" Dec 13 14:34:50.156137 kubelet[2545]: I1213 14:34:50.156094 2545 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:34:50.156137 kubelet[2545]: I1213 14:34:50.156148 2545 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:34:55.358454 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.HE0EjQ.mount: Deactivated successfully. Dec 13 14:35:12.521051 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.o0acD1.mount: Deactivated successfully. Dec 13 14:35:13.530176 kubelet[2545]: I1213 14:35:13.530132 2545 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:35:13.551076 kubelet[2545]: I1213 14:35:13.551040 2545 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-527d7" podStartSLOduration=54.333828887 podStartE2EDuration="1m3.550993877s" podCreationTimestamp="2024-12-13 14:34:10 +0000 UTC" firstStartedPulling="2024-12-13 14:34:39.605566416 +0000 UTC m=+51.697732268" lastFinishedPulling="2024-12-13 14:34:48.822731506 +0000 UTC m=+60.914897258" observedRunningTime="2024-12-13 14:34:49.368015179 +0000 UTC m=+61.460180931" watchObservedRunningTime="2024-12-13 14:35:13.550993877 +0000 UTC m=+85.643159729" Dec 13 14:35:13.575000 audit[5305]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=5305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:13.580859 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 14:35:13.580965 kernel: audit: type=1325 audit(1734100513.575:1363): table=filter:122 family=2 entries=8 op=nft_register_rule pid=5305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:13.597886 kernel: audit: type=1300 audit(1734100513.575:1363): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf9c43e80 a2=0 a3=7ffcf9c43e6c items=0 ppid=2723 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.575000 audit[5305]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf9c43e80 a2=0 a3=7ffcf9c43e6c items=0 ppid=2723 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:13.610000 audit[5305]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=5305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:13.630436 kernel: audit: type=1327 audit(1734100513.575:1363): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:13.630538 kernel: audit: type=1325 audit(1734100513.610:1364): table=nat:123 family=2 entries=34 op=nft_register_chain pid=5305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:13.630569 kernel: audit: type=1300 audit(1734100513.610:1364): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcf9c43e80 a2=0 a3=7ffcf9c43e6c items=0 ppid=2723 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.610000 audit[5305]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcf9c43e80 a2=0 a3=7ffcf9c43e6c items=0 ppid=2723 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:13.657783 kernel: audit: type=1327 audit(1734100513.610:1364): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:25.358623 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.w71koc.mount: Deactivated successfully. Dec 13 14:35:42.265000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:42.265000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:42.282817 kernel: audit: type=1400 audit(1734100542.265:1365): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:42.282885 kernel: audit: type=1400 audit(1734100542.265:1366): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:42.265000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002932a60 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:42.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:42.318819 kernel: audit: type=1300 audit(1734100542.265:1366): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002932a60 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:42.318887 kernel: audit: type=1327 audit(1734100542.265:1366): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:42.265000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028fca80 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:42.355024 kernel: audit: type=1300 audit(1734100542.265:1365): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028fca80 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:42.355153 kernel: audit: type=1327 audit(1734100542.265:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:42.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:42.512644 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.OR7Vin.mount: Deactivated successfully. Dec 13 14:35:43.068000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.068000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f43ad50 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.093819 kernel: audit: type=1400 audit(1734100543.068:1367): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.093925 kernel: audit: type=1300 audit(1734100543.068:1367): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f43ad50 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.068000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.127944 kernel: audit: type=1327 audit(1734100543.068:1367): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.071000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.144418 kernel: audit: type=1400 audit(1734100543.071:1368): avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.071000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f43ae10 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.071000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.073000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.073000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f43af60 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.073000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.079000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.079000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f1a6560 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.110000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.110000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00f1a65a0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.110000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:43.110000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:43.110000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00f43b0e0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:35:43.110000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:35:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027777e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002932ce0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.855000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.855000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002933000 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:46.855000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.857000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.857000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029331a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:35:46.857000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:48.361000 audit[4820]: AVC avc: denied { watch } for pid=4820 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.2109466111/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c145,c202 tclass=file permissive=0 Dec 13 14:35:48.369864 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:35:48.369986 kernel: audit: type=1400 audit(1734100548.361:1377): avc: denied { watch } for pid=4820 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.2109466111/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c145,c202 tclass=file permissive=0 Dec 13 14:35:48.361000 audit[4820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b5a0a0 a2=fc6 a3=0 items=0 ppid=4251 pid=4820 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 key=(null) Dec 13 14:35:48.395474 kernel: audit: type=1300 audit(1734100548.361:1377): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b5a0a0 a2=fc6 a3=0 items=0 ppid=4251 pid=4820 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 key=(null) Dec 13 14:35:48.361000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:48.415815 kernel: audit: type=1327 audit(1734100548.361:1377): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:48.878000 audit[4857]: AVC avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:35:48.878000 audit[4857]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002563be0 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:35:48.898814 kernel: audit: type=1400 audit(1734100548.878:1378): avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:35:48.898861 kernel: audit: type=1300 audit(1734100548.878:1378): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002563be0 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:35:48.878000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:48.919825 kernel: audit: type=1327 audit(1734100548.878:1378): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:55.357120 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.icPTnc.mount: Deactivated successfully. Dec 13 14:36:12.530103 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.wCJNw3.mount: Deactivated successfully. Dec 13 14:36:25.378034 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.Xzp9C0.mount: Deactivated successfully. Dec 13 14:36:26.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.16.10:37544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:26.070072 kernel: audit: type=1130 audit(1734100586.051:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.16.10:37544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:26.052110 systemd[1]: Started sshd@7-10.200.8.37:22-10.200.16.10:37544.service. Dec 13 14:36:26.763000 audit[5471]: USER_ACCT pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.766285 sshd[5471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:26.783761 sshd[5471]: Accepted publickey for core from 10.200.16.10 port 37544 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:26.784001 kernel: audit: type=1101 audit(1734100586.763:1380): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.765000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.791117 systemd-logind[1399]: New session 10 of user core. Dec 13 14:36:26.792694 systemd[1]: Started session-10.scope. Dec 13 14:36:26.811066 kernel: audit: type=1103 audit(1734100586.765:1381): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.811139 kernel: audit: type=1006 audit(1734100586.765:1382): pid=5471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:36:26.811165 kernel: audit: type=1300 audit(1734100586.765:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd29c91bb0 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:26.765000 audit[5471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd29c91bb0 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:26.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:26.827818 kernel: audit: type=1327 audit(1734100586.765:1382): proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:26.798000 audit[5471]: USER_START pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.834333 kernel: audit: type=1105 audit(1734100586.798:1383): pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.800000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:26.850816 kernel: audit: type=1103 audit(1734100586.800:1384): pid=5473 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:27.339593 sshd[5471]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:27.341000 audit[5471]: USER_END pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:27.344443 systemd-logind[1399]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:36:27.346041 systemd[1]: sshd@7-10.200.8.37:22-10.200.16.10:37544.service: Deactivated successfully. Dec 13 14:36:27.346965 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:36:27.348536 systemd-logind[1399]: Removed session 10. Dec 13 14:36:27.361829 kernel: audit: type=1106 audit(1734100587.341:1385): pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:27.361919 kernel: audit: type=1104 audit(1734100587.341:1386): pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:27.341000 audit[5471]: CRED_DISP pid=5471 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:27.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.16.10:37544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:32.459034 systemd[1]: Started sshd@8-10.200.8.37:22-10.200.16.10:60582.service. Dec 13 14:36:32.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.16.10:60582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:32.481097 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:36:32.481225 kernel: audit: type=1130 audit(1734100592.458:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.16.10:60582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.170000 audit[5486]: USER_ACCT pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.189947 kernel: audit: type=1101 audit(1734100593.170:1389): pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.190006 sshd[5486]: Accepted publickey for core from 10.200.16.10 port 60582 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:33.190389 sshd[5486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.189000 audit[5486]: CRED_ACQ pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.197730 systemd[1]: Started session-11.scope. Dec 13 14:36:33.198726 systemd-logind[1399]: New session 11 of user core. Dec 13 14:36:33.217369 kernel: audit: type=1103 audit(1734100593.189:1390): pid=5486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.217475 kernel: audit: type=1006 audit(1734100593.189:1391): pid=5486 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:36:33.217504 kernel: audit: type=1300 audit(1734100593.189:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa3d3f580 a2=3 a3=0 items=0 ppid=1 pid=5486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:33.189000 audit[5486]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa3d3f580 a2=3 a3=0 items=0 ppid=1 pid=5486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:33.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:33.239529 kernel: audit: type=1327 audit(1734100593.189:1391): proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:33.256843 kernel: audit: type=1105 audit(1734100593.202:1392): pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.202000 audit[5486]: USER_START pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.205000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.272821 kernel: audit: type=1103 audit(1734100593.205:1393): pid=5488 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.732574 sshd[5486]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.733000 audit[5486]: USER_END pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.736372 systemd-logind[1399]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:36:33.738142 systemd[1]: sshd@8-10.200.8.37:22-10.200.16.10:60582.service: Deactivated successfully. Dec 13 14:36:33.739076 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:36:33.741000 systemd-logind[1399]: Removed session 11. Dec 13 14:36:33.733000 audit[5486]: CRED_DISP pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.767543 kernel: audit: type=1106 audit(1734100593.733:1394): pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.767615 kernel: audit: type=1104 audit(1734100593.733:1395): pid=5486 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:33.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.16.10:60582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:38.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.16.10:39174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:38.852427 systemd[1]: Started sshd@9-10.200.8.37:22-10.200.16.10:39174.service. Dec 13 14:36:38.857248 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:36:38.857334 kernel: audit: type=1130 audit(1734100598.850:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.16.10:39174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:39.566679 sshd[5499]: Accepted publickey for core from 10.200.16.10 port 39174 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:39.568387 sshd[5499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:39.565000 audit[5499]: USER_ACCT pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.585421 systemd[1]: Started session-12.scope. Dec 13 14:36:39.587112 systemd-logind[1399]: New session 12 of user core. Dec 13 14:36:39.566000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.610148 kernel: audit: type=1101 audit(1734100599.565:1398): pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.610257 kernel: audit: type=1103 audit(1734100599.566:1399): pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.610307 kernel: audit: type=1006 audit(1734100599.566:1400): pid=5499 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:36:39.621814 kernel: audit: type=1300 audit(1734100599.566:1400): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51124ad0 a2=3 a3=0 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.566000 audit[5499]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51124ad0 a2=3 a3=0 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:39.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:39.592000 audit[5499]: USER_START pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.641872 kernel: audit: type=1327 audit(1734100599.566:1400): proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:39.641921 kernel: audit: type=1105 audit(1734100599.592:1401): pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.659346 kernel: audit: type=1103 audit(1734100599.592:1402): pid=5501 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:39.592000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:40.131688 sshd[5499]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:40.131000 audit[5499]: USER_END pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:40.135297 systemd[1]: sshd@9-10.200.8.37:22-10.200.16.10:39174.service: Deactivated successfully. Dec 13 14:36:40.136124 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:36:40.137714 systemd-logind[1399]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:36:40.138674 systemd-logind[1399]: Removed session 12. Dec 13 14:36:40.131000 audit[5499]: CRED_DISP pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:40.166075 kernel: audit: type=1106 audit(1734100600.131:1403): pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:40.166211 kernel: audit: type=1104 audit(1734100600.131:1404): pid=5499 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:40.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.16.10:39174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:42.265000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:42.265000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009662c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:42.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:42.267000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:42.267000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000be84e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:42.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:42.508495 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.G08DQA.mount: Deactivated successfully. Dec 13 14:36:43.071000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.071000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c011328690 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.071000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:43.072000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.072000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0113286c0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.072000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:43.072000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.072000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0113286f0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.072000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:43.080000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.080000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00fa519e0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:43.111000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.111000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:43.111000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010ebe060 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.111000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:43.111000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00f9db840 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:36:43.111000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:36:45.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.16.10:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:45.278043 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:36:45.278118 kernel: audit: type=1130 audit(1734100605.251:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.16.10:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:45.253060 systemd[1]: Started sshd@10-10.200.8.37:22-10.200.16.10:39186.service. Dec 13 14:36:45.963000 audit[5534]: USER_ACCT pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:45.965788 sshd[5534]: Accepted publickey for core from 10.200.16.10 port 39186 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:45.967587 sshd[5534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:45.984819 kernel: audit: type=1101 audit(1734100605.963:1415): pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:45.965000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:45.993809 systemd[1]: Started session-13.scope. Dec 13 14:36:45.994959 systemd-logind[1399]: New session 13 of user core. Dec 13 14:36:46.003823 kernel: audit: type=1103 audit(1734100605.965:1416): pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:45.965000 audit[5534]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd888f6a0 a2=3 a3=0 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:46.036812 kernel: audit: type=1006 audit(1734100605.965:1417): pid=5534 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:36:46.037002 kernel: audit: type=1300 audit(1734100605.965:1417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd888f6a0 a2=3 a3=0 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:46.037040 kernel: audit: type=1327 audit(1734100605.965:1417): proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:45.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:45.999000 audit[5534]: USER_START pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.060412 kernel: audit: type=1105 audit(1734100605.999:1418): pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.060619 kernel: audit: type=1103 audit(1734100606.001:1419): pid=5539 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.001000 audit[5539]: CRED_ACQ pid=5539 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.527242 sshd[5534]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:46.527000 audit[5534]: USER_END pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.531264 systemd[1]: sshd@10-10.200.8.37:22-10.200.16.10:39186.service: Deactivated successfully. Dec 13 14:36:46.532197 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:36:46.535528 systemd-logind[1399]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:36:46.536456 systemd-logind[1399]: Removed session 13. Dec 13 14:36:46.527000 audit[5534]: CRED_DISP pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.562782 kernel: audit: type=1106 audit(1734100606.527:1420): pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.562917 kernel: audit: type=1104 audit(1734100606.527:1421): pid=5534 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:46.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.16.10:39186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.646284 systemd[1]: Started sshd@11-10.200.8.37:22-10.200.16.10:39198.service. Dec 13 14:36:46.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.16.10:39198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:46.856000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:46.856000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000966e80 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:46.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:46.856000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:46.856000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c81a80 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:46.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:46.856000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:46.856000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000967320 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:46.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:46.857000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:46.857000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009677c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:36:46.857000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:47.356000 audit[5550]: USER_ACCT pid=5550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.358523 sshd[5550]: Accepted publickey for core from 10.200.16.10 port 39198 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:47.357000 audit[5550]: CRED_ACQ pid=5550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.357000 audit[5550]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25bd0340 a2=3 a3=0 items=0 ppid=1 pid=5550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:47.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:47.359964 sshd[5550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:47.365217 systemd[1]: Started session-14.scope. Dec 13 14:36:47.365872 systemd-logind[1399]: New session 14 of user core. Dec 13 14:36:47.368000 audit[5550]: USER_START pid=5550 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.370000 audit[5552]: CRED_ACQ pid=5552 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.965624 sshd[5550]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:47.965000 audit[5550]: USER_END pid=5550 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.965000 audit[5550]: CRED_DISP pid=5550 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:47.968818 systemd[1]: sshd@11-10.200.8.37:22-10.200.16.10:39198.service: Deactivated successfully. Dec 13 14:36:47.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.16.10:39198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:47.970309 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:36:47.970350 systemd-logind[1399]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:36:47.971397 systemd-logind[1399]: Removed session 14. Dec 13 14:36:48.084712 systemd[1]: Started sshd@12-10.200.8.37:22-10.200.16.10:39214.service. Dec 13 14:36:48.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.16.10:39214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:48.362000 audit[4820]: AVC avc: denied { watch } for pid=4820 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.2109466111/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c145,c202 tclass=file permissive=0 Dec 13 14:36:48.362000 audit[4820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b5b020 a2=fc6 a3=0 items=0 ppid=4251 pid=4820 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 key=(null) Dec 13 14:36:48.362000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:36:48.794000 audit[5562]: USER_ACCT pid=5562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:48.797727 sshd[5562]: Accepted publickey for core from 10.200.16.10 port 39214 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:48.796000 audit[5562]: CRED_ACQ pid=5562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:48.796000 audit[5562]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe060760 a2=3 a3=0 items=0 ppid=1 pid=5562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:48.798467 sshd[5562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:48.803416 systemd[1]: Started session-15.scope. Dec 13 14:36:48.803902 systemd-logind[1399]: New session 15 of user core. Dec 13 14:36:48.806000 audit[5562]: USER_START pid=5562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:48.808000 audit[5564]: CRED_ACQ pid=5564 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:48.879000 audit[4857]: AVC avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:36:48.879000 audit[4857]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001151300 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:36:48.879000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:36:49.358215 sshd[5562]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:49.358000 audit[5562]: USER_END pid=5562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:49.358000 audit[5562]: CRED_DISP pid=5562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:49.362044 systemd[1]: sshd@12-10.200.8.37:22-10.200.16.10:39214.service: Deactivated successfully. Dec 13 14:36:49.362933 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:36:49.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.16.10:39214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:49.362940 systemd-logind[1399]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:36:49.364074 systemd-logind[1399]: Removed session 15. Dec 13 14:36:54.480670 systemd[1]: Started sshd@13-10.200.8.37:22-10.200.16.10:46100.service. Dec 13 14:36:54.504257 kernel: kauditd_printk_skb: 41 callbacks suppressed Dec 13 14:36:54.504377 kernel: audit: type=1130 audit(1734100614.480:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.16.10:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:54.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.16.10:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:55.190000 audit[5578]: USER_ACCT pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.209679 sshd[5578]: Accepted publickey for core from 10.200.16.10 port 46100 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:36:55.210033 kernel: audit: type=1101 audit(1734100615.190:1448): pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.210147 sshd[5578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:55.208000 audit[5578]: CRED_ACQ pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.215704 systemd[1]: Started session-16.scope. Dec 13 14:36:55.216751 systemd-logind[1399]: New session 16 of user core. Dec 13 14:36:55.227882 kernel: audit: type=1103 audit(1734100615.208:1449): pid=5578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.227945 kernel: audit: type=1006 audit(1734100615.208:1450): pid=5578 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:36:55.208000 audit[5578]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd681780a0 a2=3 a3=0 items=0 ppid=1 pid=5578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.236833 kernel: audit: type=1300 audit(1734100615.208:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd681780a0 a2=3 a3=0 items=0 ppid=1 pid=5578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:55.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:55.252854 kernel: audit: type=1327 audit(1734100615.208:1450): proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:55.221000 audit[5578]: USER_START pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.279593 kernel: audit: type=1105 audit(1734100615.221:1451): pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.223000 audit[5580]: CRED_ACQ pid=5580 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.298285 kernel: audit: type=1103 audit(1734100615.223:1452): pid=5580 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.359928 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.tvJPqr.mount: Deactivated successfully. Dec 13 14:36:55.749338 sshd[5578]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:55.749000 audit[5578]: USER_END pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.757920 systemd[1]: sshd@13-10.200.8.37:22-10.200.16.10:46100.service: Deactivated successfully. Dec 13 14:36:55.758729 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:36:55.766749 systemd-logind[1399]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:36:55.767977 systemd-logind[1399]: Removed session 16. Dec 13 14:36:55.749000 audit[5578]: CRED_DISP pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.784950 kernel: audit: type=1106 audit(1734100615.749:1453): pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.785088 kernel: audit: type=1104 audit(1734100615.749:1454): pid=5578 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:36:55.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.16.10:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:00.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.37:22-10.200.16.10:35558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:00.869527 systemd[1]: Started sshd@14-10.200.8.37:22-10.200.16.10:35558.service. Dec 13 14:37:00.892752 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:00.892897 kernel: audit: type=1130 audit(1734100620.869:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.37:22-10.200.16.10:35558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:01.582000 audit[5609]: USER_ACCT pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.584814 sshd[5609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:01.601495 sshd[5609]: Accepted publickey for core from 10.200.16.10 port 35558 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:01.601819 kernel: audit: type=1101 audit(1734100621.582:1457): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.583000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.610451 systemd[1]: Started session-17.scope. Dec 13 14:37:01.611133 systemd-logind[1399]: New session 17 of user core. Dec 13 14:37:01.619820 kernel: audit: type=1103 audit(1734100621.583:1458): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.583000 audit[5609]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b8a8050 a2=3 a3=0 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.630842 kernel: audit: type=1006 audit(1734100621.583:1459): pid=5609 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:37:01.630884 kernel: audit: type=1300 audit(1734100621.583:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b8a8050 a2=3 a3=0 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:01.646869 kernel: audit: type=1327 audit(1734100621.583:1459): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:01.617000 audit[5609]: USER_START pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.620000 audit[5613]: CRED_ACQ pid=5613 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.685718 kernel: audit: type=1105 audit(1734100621.617:1460): pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:01.685864 kernel: audit: type=1103 audit(1734100621.620:1461): pid=5613 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:02.142394 sshd[5609]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:02.142000 audit[5609]: USER_END pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:02.151337 systemd[1]: sshd@14-10.200.8.37:22-10.200.16.10:35558.service: Deactivated successfully. Dec 13 14:37:02.152248 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:37:02.153714 systemd-logind[1399]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:37:02.154737 systemd-logind[1399]: Removed session 17. Dec 13 14:37:02.142000 audit[5609]: CRED_DISP pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:02.166835 kernel: audit: type=1106 audit(1734100622.142:1462): pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:02.166904 kernel: audit: type=1104 audit(1734100622.142:1463): pid=5609 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:02.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.37:22-10.200.16.10:35558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:07.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.37:22-10.200.16.10:35564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:07.263505 systemd[1]: Started sshd@15-10.200.8.37:22-10.200.16.10:35564.service. Dec 13 14:37:07.268835 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:07.268933 kernel: audit: type=1130 audit(1734100627.262:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.37:22-10.200.16.10:35564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:07.974000 audit[5626]: USER_ACCT pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:07.994973 kernel: audit: type=1101 audit(1734100627.974:1466): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:07.995029 sshd[5626]: Accepted publickey for core from 10.200.16.10 port 35564 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:07.995414 sshd[5626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:07.994000 audit[5626]: CRED_ACQ pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.001051 systemd[1]: Started session-18.scope. Dec 13 14:37:08.001856 systemd-logind[1399]: New session 18 of user core. Dec 13 14:37:08.021751 kernel: audit: type=1103 audit(1734100627.994:1467): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.021910 kernel: audit: type=1006 audit(1734100627.994:1468): pid=5626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:37:08.021940 kernel: audit: type=1300 audit(1734100627.994:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc326be660 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:07.994000 audit[5626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc326be660 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:07.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:08.043589 kernel: audit: type=1327 audit(1734100627.994:1468): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:08.043689 kernel: audit: type=1105 audit(1734100628.006:1469): pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.006000 audit[5626]: USER_START pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.006000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.082538 kernel: audit: type=1103 audit(1734100628.006:1470): pid=5628 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.533147 sshd[5626]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:08.533000 audit[5626]: USER_END pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.542198 systemd[1]: sshd@15-10.200.8.37:22-10.200.16.10:35564.service: Deactivated successfully. Dec 13 14:37:08.542918 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:37:08.544475 systemd-logind[1399]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:37:08.545436 systemd-logind[1399]: Removed session 18. Dec 13 14:37:08.557828 kernel: audit: type=1106 audit(1734100628.533:1471): pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.557923 kernel: audit: type=1104 audit(1734100628.533:1472): pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.533000 audit[5626]: CRED_DISP pid=5626 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:08.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.37:22-10.200.16.10:35564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:12.555330 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.3xbBWV.mount: Deactivated successfully. Dec 13 14:37:13.652340 systemd[1]: Started sshd@16-10.200.8.37:22-10.200.16.10:53214.service. Dec 13 14:37:13.674601 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:13.674715 kernel: audit: type=1130 audit(1734100633.652:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.37:22-10.200.16.10:53214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:13.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.37:22-10.200.16.10:53214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:14.366000 audit[5678]: USER_ACCT pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.367000 audit[5678]: CRED_ACQ pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.369059 sshd[5678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:14.386232 sshd[5678]: Accepted publickey for core from 10.200.16.10 port 53214 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:14.391618 systemd[1]: Started session-19.scope. Dec 13 14:37:14.392971 systemd-logind[1399]: New session 19 of user core. Dec 13 14:37:14.403602 kernel: audit: type=1101 audit(1734100634.366:1475): pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.403704 kernel: audit: type=1103 audit(1734100634.367:1476): pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.403729 kernel: audit: type=1006 audit(1734100634.367:1477): pid=5678 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:37:14.367000 audit[5678]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c414c40 a2=3 a3=0 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.428849 kernel: audit: type=1300 audit(1734100634.367:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c414c40 a2=3 a3=0 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.428953 kernel: audit: type=1327 audit(1734100634.367:1477): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:14.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:14.434836 kernel: audit: type=1105 audit(1734100634.403:1478): pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.403000 audit[5678]: USER_START pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.405000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.466828 kernel: audit: type=1103 audit(1734100634.405:1479): pid=5680 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.928480 sshd[5678]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:14.929000 audit[5678]: USER_END pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.932638 systemd-logind[1399]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:37:14.934055 systemd[1]: sshd@16-10.200.8.37:22-10.200.16.10:53214.service: Deactivated successfully. Dec 13 14:37:14.934845 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:37:14.936097 systemd-logind[1399]: Removed session 19. Dec 13 14:37:14.929000 audit[5678]: CRED_DISP pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.963270 kernel: audit: type=1106 audit(1734100634.929:1480): pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.963385 kernel: audit: type=1104 audit(1734100634.929:1481): pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:14.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.37:22-10.200.16.10:53214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:15.048370 systemd[1]: Started sshd@17-10.200.8.37:22-10.200.16.10:53216.service. Dec 13 14:37:15.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.37:22-10.200.16.10:53216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:15.757000 audit[5692]: USER_ACCT pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:15.759019 sshd[5692]: Accepted publickey for core from 10.200.16.10 port 53216 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:15.759000 audit[5692]: CRED_ACQ pid=5692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:15.759000 audit[5692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdabcbb180 a2=3 a3=0 items=0 ppid=1 pid=5692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:15.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:15.760615 sshd[5692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:15.765888 systemd-logind[1399]: New session 20 of user core. Dec 13 14:37:15.766064 systemd[1]: Started session-20.scope. Dec 13 14:37:15.770000 audit[5692]: USER_START pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:15.771000 audit[5700]: CRED_ACQ pid=5700 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:16.416329 sshd[5692]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:16.417000 audit[5692]: USER_END pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:16.417000 audit[5692]: CRED_DISP pid=5692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:16.420494 systemd-logind[1399]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:37:16.420718 systemd[1]: sshd@17-10.200.8.37:22-10.200.16.10:53216.service: Deactivated successfully. Dec 13 14:37:16.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.37:22-10.200.16.10:53216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:16.422031 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:37:16.423073 systemd-logind[1399]: Removed session 20. Dec 13 14:37:16.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.37:22-10.200.16.10:53220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:16.540930 systemd[1]: Started sshd@18-10.200.8.37:22-10.200.16.10:53220.service. Dec 13 14:37:17.251000 audit[5708]: USER_ACCT pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:17.252883 sshd[5708]: Accepted publickey for core from 10.200.16.10 port 53220 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:17.253000 audit[5708]: CRED_ACQ pid=5708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:17.253000 audit[5708]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6a03d490 a2=3 a3=0 items=0 ppid=1 pid=5708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:17.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:17.254855 sshd[5708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:17.259860 systemd-logind[1399]: New session 21 of user core. Dec 13 14:37:17.260487 systemd[1]: Started session-21.scope. Dec 13 14:37:17.264000 audit[5708]: USER_START pid=5708 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:17.266000 audit[5710]: CRED_ACQ pid=5710 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:19.448000 audit[5720]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.453374 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:37:19.453467 kernel: audit: type=1325 audit(1734100639.448:1498): table=filter:124 family=2 entries=20 op=nft_register_rule pid=5720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.448000 audit[5720]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffff95ea280 a2=0 a3=7ffff95ea26c items=0 ppid=2723 pid=5720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.483877 kernel: audit: type=1300 audit(1734100639.448:1498): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffff95ea280 a2=0 a3=7ffff95ea26c items=0 ppid=2723 pid=5720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.499818 kernel: audit: type=1327 audit(1734100639.448:1498): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.469000 audit[5720]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.510837 kernel: audit: type=1325 audit(1734100639.469:1499): table=nat:125 family=2 entries=22 op=nft_register_rule pid=5720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.469000 audit[5720]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff95ea280 a2=0 a3=0 items=0 ppid=2723 pid=5720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.539762 kernel: audit: type=1300 audit(1734100639.469:1499): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff95ea280 a2=0 a3=0 items=0 ppid=2723 pid=5720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.539919 kernel: audit: type=1327 audit(1734100639.469:1499): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.539967 kernel: audit: type=1325 audit(1734100639.505:1500): table=filter:126 family=2 entries=32 op=nft_register_rule pid=5722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.505000 audit[5722]: NETFILTER_CFG table=filter:126 family=2 entries=32 op=nft_register_rule pid=5722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.505000 audit[5722]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff57065a90 a2=0 a3=7fff57065a7c items=0 ppid=2723 pid=5722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.568418 kernel: audit: type=1300 audit(1734100639.505:1500): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff57065a90 a2=0 a3=7fff57065a7c items=0 ppid=2723 pid=5722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.577995 kernel: audit: type=1327 audit(1734100639.505:1500): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.578139 kernel: audit: type=1325 audit(1734100639.535:1501): table=nat:127 family=2 entries=22 op=nft_register_rule pid=5722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.535000 audit[5722]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:19.535000 audit[5722]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff57065a90 a2=0 a3=0 items=0 ppid=2723 pid=5722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:19.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:19.600707 sshd[5708]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:19.602000 audit[5708]: USER_END pid=5708 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:19.602000 audit[5708]: CRED_DISP pid=5708 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:19.604250 systemd[1]: sshd@18-10.200.8.37:22-10.200.16.10:53220.service: Deactivated successfully. Dec 13 14:37:19.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.37:22-10.200.16.10:53220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:19.605532 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:37:19.606358 systemd-logind[1399]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:37:19.607233 systemd-logind[1399]: Removed session 21. Dec 13 14:37:19.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.37:22-10.200.16.10:56816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:19.722099 systemd[1]: Started sshd@19-10.200.8.37:22-10.200.16.10:56816.service. Dec 13 14:37:20.434000 audit[5725]: USER_ACCT pid=5725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:20.435682 sshd[5725]: Accepted publickey for core from 10.200.16.10 port 56816 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:20.435000 audit[5725]: CRED_ACQ pid=5725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:20.436000 audit[5725]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc207fea0 a2=3 a3=0 items=0 ppid=1 pid=5725 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:20.436000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:20.437195 sshd[5725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:20.442229 systemd-logind[1399]: New session 22 of user core. Dec 13 14:37:20.442728 systemd[1]: Started session-22.scope. Dec 13 14:37:20.447000 audit[5725]: USER_START pid=5725 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:20.448000 audit[5727]: CRED_ACQ pid=5727 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.109231 sshd[5725]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:21.110000 audit[5725]: USER_END pid=5725 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.110000 audit[5725]: CRED_DISP pid=5725 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.113362 systemd-logind[1399]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:37:21.113609 systemd[1]: sshd@19-10.200.8.37:22-10.200.16.10:56816.service: Deactivated successfully. Dec 13 14:37:21.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.37:22-10.200.16.10:56816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:21.114758 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:37:21.115703 systemd-logind[1399]: Removed session 22. Dec 13 14:37:21.227653 systemd[1]: Started sshd@20-10.200.8.37:22-10.200.16.10:56832.service. Dec 13 14:37:21.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.37:22-10.200.16.10:56832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:21.938000 audit[5734]: USER_ACCT pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.939196 sshd[5734]: Accepted publickey for core from 10.200.16.10 port 56832 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:21.939000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.939000 audit[5734]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7cf42fb0 a2=3 a3=0 items=0 ppid=1 pid=5734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:21.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:21.940853 sshd[5734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:21.945684 systemd-logind[1399]: New session 23 of user core. Dec 13 14:37:21.946210 systemd[1]: Started session-23.scope. Dec 13 14:37:21.950000 audit[5734]: USER_START pid=5734 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:21.951000 audit[5738]: CRED_ACQ pid=5738 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:22.505669 sshd[5734]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:22.506000 audit[5734]: USER_END pid=5734 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:22.506000 audit[5734]: CRED_DISP pid=5734 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:22.508843 systemd-logind[1399]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:37:22.509080 systemd[1]: sshd@20-10.200.8.37:22-10.200.16.10:56832.service: Deactivated successfully. Dec 13 14:37:22.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.37:22-10.200.16.10:56832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:22.510116 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:37:22.511089 systemd-logind[1399]: Removed session 23. Dec 13 14:37:27.626099 systemd[1]: Started sshd@21-10.200.8.37:22-10.200.16.10:56838.service. Dec 13 14:37:27.648686 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:37:27.648830 kernel: audit: type=1130 audit(1734100647.626:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.37:22-10.200.16.10:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:27.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.37:22-10.200.16.10:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:28.337000 audit[5767]: USER_ACCT pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.338350 sshd[5767]: Accepted publickey for core from 10.200.16.10 port 56838 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:28.356000 audit[5767]: CRED_ACQ pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.357983 sshd[5767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:28.363149 systemd[1]: Started session-24.scope. Dec 13 14:37:28.364152 systemd-logind[1399]: New session 24 of user core. Dec 13 14:37:28.373660 kernel: audit: type=1101 audit(1734100648.337:1524): pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.373748 kernel: audit: type=1103 audit(1734100648.356:1525): pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.373786 kernel: audit: type=1006 audit(1734100648.356:1526): pid=5767 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:37:28.385775 kernel: audit: type=1300 audit(1734100648.356:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67d9fb00 a2=3 a3=0 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.356000 audit[5767]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67d9fb00 a2=3 a3=0 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:28.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:28.373000 audit[5767]: USER_START pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.421933 kernel: audit: type=1327 audit(1734100648.356:1526): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:28.422022 kernel: audit: type=1105 audit(1734100648.373:1527): pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.422048 kernel: audit: type=1103 audit(1734100648.375:1528): pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.375000 audit[5769]: CRED_ACQ pid=5769 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.899068 sshd[5767]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:28.899000 audit[5767]: USER_END pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.916173 systemd[1]: sshd@21-10.200.8.37:22-10.200.16.10:56838.service: Deactivated successfully. Dec 13 14:37:28.917003 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:37:28.918904 systemd-logind[1399]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:37:28.920119 systemd-logind[1399]: Removed session 24. Dec 13 14:37:28.899000 audit[5767]: CRED_DISP pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.937649 kernel: audit: type=1106 audit(1734100648.899:1529): pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.937733 kernel: audit: type=1104 audit(1734100648.899:1530): pid=5767 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:28.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.37:22-10.200.16.10:56838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:34.036904 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:34.037069 kernel: audit: type=1130 audit(1734100654.014:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.37:22-10.200.16.10:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:34.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.37:22-10.200.16.10:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:34.015244 systemd[1]: Started sshd@22-10.200.8.37:22-10.200.16.10:43726.service. Dec 13 14:37:34.726000 audit[5780]: USER_ACCT pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.752145 sshd[5780]: Accepted publickey for core from 10.200.16.10 port 43726 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:34.751000 audit[5780]: CRED_ACQ pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.752712 sshd[5780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:34.773214 systemd[1]: Started session-25.scope. Dec 13 14:37:34.773585 systemd-logind[1399]: New session 25 of user core. Dec 13 14:37:34.783096 kernel: audit: type=1101 audit(1734100654.726:1533): pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.783245 kernel: audit: type=1103 audit(1734100654.751:1534): pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.795384 kernel: audit: type=1006 audit(1734100654.751:1535): pid=5780 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:37:34.795549 kernel: audit: type=1300 audit(1734100654.751:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff839f3230 a2=3 a3=0 items=0 ppid=1 pid=5780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:34.751000 audit[5780]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff839f3230 a2=3 a3=0 items=0 ppid=1 pid=5780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:34.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:34.780000 audit[5780]: USER_START pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.846050 kernel: audit: type=1327 audit(1734100654.751:1535): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:34.846624 kernel: audit: type=1105 audit(1734100654.780:1536): pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.847535 kernel: audit: type=1103 audit(1734100654.782:1537): pid=5782 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:34.782000 audit[5782]: CRED_ACQ pid=5782 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:35.287010 sshd[5780]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:35.287000 audit[5780]: USER_END pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:35.290448 systemd[1]: sshd@22-10.200.8.37:22-10.200.16.10:43726.service: Deactivated successfully. Dec 13 14:37:35.291399 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:37:35.293454 systemd-logind[1399]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:37:35.294450 systemd-logind[1399]: Removed session 25. Dec 13 14:37:35.287000 audit[5780]: CRED_DISP pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:35.323673 kernel: audit: type=1106 audit(1734100655.287:1538): pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:35.323854 kernel: audit: type=1104 audit(1734100655.287:1539): pid=5780 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:35.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.37:22-10.200.16.10:43726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:40.406672 systemd[1]: Started sshd@23-10.200.8.37:22-10.200.16.10:59414.service. Dec 13 14:37:40.429408 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:40.429557 kernel: audit: type=1130 audit(1734100660.406:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.37:22-10.200.16.10:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:40.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.37:22-10.200.16.10:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:41.117000 audit[5804]: USER_ACCT pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.118244 sshd[5804]: Accepted publickey for core from 10.200.16.10 port 59414 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:41.138084 kernel: audit: type=1101 audit(1734100661.117:1542): pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.138191 kernel: audit: type=1103 audit(1734100661.136:1543): pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.136000 audit[5804]: CRED_ACQ pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.137690 sshd[5804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:41.143260 systemd[1]: Started session-26.scope. Dec 13 14:37:41.144707 systemd-logind[1399]: New session 26 of user core. Dec 13 14:37:41.153863 kernel: audit: type=1006 audit(1734100661.136:1544): pid=5804 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:37:41.136000 audit[5804]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4affe600 a2=3 a3=0 items=0 ppid=1 pid=5804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.180289 kernel: audit: type=1300 audit(1734100661.136:1544): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4affe600 a2=3 a3=0 items=0 ppid=1 pid=5804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:41.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:41.180823 kernel: audit: type=1327 audit(1734100661.136:1544): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:41.146000 audit[5804]: USER_START pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.186857 kernel: audit: type=1105 audit(1734100661.146:1545): pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.146000 audit[5807]: CRED_ACQ pid=5807 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.218456 kernel: audit: type=1103 audit(1734100661.146:1546): pid=5807 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.683259 sshd[5804]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:41.683000 audit[5804]: USER_END pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.685834 systemd[1]: sshd@23-10.200.8.37:22-10.200.16.10:59414.service: Deactivated successfully. Dec 13 14:37:41.686607 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:37:41.688954 systemd-logind[1399]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:37:41.689905 systemd-logind[1399]: Removed session 26. Dec 13 14:37:41.683000 audit[5804]: CRED_DISP pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.717252 kernel: audit: type=1106 audit(1734100661.683:1547): pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.717343 kernel: audit: type=1104 audit(1734100661.683:1548): pid=5804 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:41.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.37:22-10.200.16.10:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:42.267000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:42.267000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e368e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:42.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:42.268000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:42.268000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e53f20 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:42.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:42.537000 audit[5835]: NETFILTER_CFG table=filter:128 family=2 entries=20 op=nft_register_rule pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:42.537000 audit[5835]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff200ca590 a2=0 a3=7fff200ca57c items=0 ppid=2723 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:42.546000 audit[5835]: NETFILTER_CFG table=nat:129 family=2 entries=106 op=nft_register_chain pid=5835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:42.546000 audit[5835]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff200ca590 a2=0 a3=7fff200ca57c items=0 ppid=2723 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:43.073000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.073000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c013c1e270 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.074000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.074000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c013bf0ba0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.074000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:43.073000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:43.075000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.075000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c013bf0cf0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.075000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:43.080000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.080000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ec73d40 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:43.112000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.112000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:43.112000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c013c1e300 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:43.112000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ecbd5e0 a2=fc6 a3=0 items=0 ppid=2307 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c585 key=(null) Dec 13 14:37:43.112000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:37:46.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.37:22-10.200.16.10:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:46.803432 systemd[1]: Started sshd@24-10.200.8.37:22-10.200.16.10:59422.service. Dec 13 14:37:46.810570 kernel: kauditd_printk_skb: 31 callbacks suppressed Dec 13 14:37:46.812026 kernel: audit: type=1130 audit(1734100666.803:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.37:22-10.200.16.10:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:46.856000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.875621 kernel: audit: type=1400 audit(1734100666.856:1561): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.875738 kernel: audit: type=1300 audit(1734100666.856:1561): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00014f460 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.856000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00014f460 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:46.911602 kernel: audit: type=1327 audit(1734100666.856:1561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:46.911730 kernel: audit: type=1400 audit(1734100666.873:1562): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.873000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.873000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014d4800 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:46.972420 kernel: audit: type=1300 audit(1734100666.873:1562): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014d4800 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.972562 kernel: audit: type=1327 audit(1734100666.873:1562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:46.972604 kernel: audit: type=1400 audit(1734100666.874:1563): avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.874000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.874000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00014f4e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:47.010097 kernel: audit: type=1300 audit(1734100666.874:1563): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00014f4e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:47.010818 kernel: audit: type=1327 audit(1734100666.874:1563): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:46.874000 audit[2362]: AVC avc: denied { watch } for pid=2362 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:46.874000 audit[2362]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00014f560 a2=fc6 a3=0 items=0 ppid=2225 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c497,c897 key=(null) Dec 13 14:37:46.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:47.519000 audit[5849]: USER_ACCT pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:47.521019 sshd[5849]: Accepted publickey for core from 10.200.16.10 port 59422 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:47.521000 audit[5849]: CRED_ACQ pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:47.521000 audit[5849]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4f474b90 a2=3 a3=0 items=0 ppid=1 pid=5849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:47.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:47.522491 sshd[5849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:47.527602 systemd[1]: Started session-27.scope. Dec 13 14:37:47.528127 systemd-logind[1399]: New session 27 of user core. Dec 13 14:37:47.532000 audit[5849]: USER_START pid=5849 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:47.535000 audit[5851]: CRED_ACQ pid=5851 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:48.084262 sshd[5849]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:48.085000 audit[5849]: USER_END pid=5849 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:48.085000 audit[5849]: CRED_DISP pid=5849 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:48.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.37:22-10.200.16.10:59422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:48.087361 systemd[1]: sshd@24-10.200.8.37:22-10.200.16.10:59422.service: Deactivated successfully. Dec 13 14:37:48.088693 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:37:48.089785 systemd-logind[1399]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:37:48.090662 systemd-logind[1399]: Removed session 27. Dec 13 14:37:48.365000 audit[4820]: AVC avc: denied { watch } for pid=4820 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.2109466111/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c145,c202 tclass=file permissive=0 Dec 13 14:37:48.365000 audit[4820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002366b40 a2=fc6 a3=0 items=0 ppid=4251 pid=4820 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c145,c202 key=(null) Dec 13 14:37:48.365000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:37:48.881000 audit[4857]: AVC avc: denied { watch } for pid=4857 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_34_25.4249100033/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c417,c732 tclass=file permissive=0 Dec 13 14:37:48.881000 audit[4857]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011506e0 a2=fc6 a3=0 items=0 ppid=4416 pid=4857 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c417,c732 key=(null) Dec 13 14:37:48.881000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:37:53.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.37:22-10.200.16.10:49720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:53.203866 systemd[1]: Started sshd@25-10.200.8.37:22-10.200.16.10:49720.service. Dec 13 14:37:53.208947 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:37:53.209040 kernel: audit: type=1130 audit(1734100673.203:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.37:22-10.200.16.10:49720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:53.915000 audit[5863]: USER_ACCT pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:53.916470 sshd[5863]: Accepted publickey for core from 10.200.16.10 port 49720 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:37:53.918444 sshd[5863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:37:53.915000 audit[5863]: CRED_ACQ pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:53.944237 systemd-logind[1399]: New session 28 of user core. Dec 13 14:37:53.947396 systemd[1]: Started session-28.scope. Dec 13 14:37:53.956928 kernel: audit: type=1101 audit(1734100673.915:1576): pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:53.957028 kernel: audit: type=1103 audit(1734100673.915:1577): pid=5863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:53.967247 kernel: audit: type=1006 audit(1734100673.915:1578): pid=5863 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:37:53.969565 kernel: audit: type=1300 audit(1734100673.915:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc46f99c70 a2=3 a3=0 items=0 ppid=1 pid=5863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:53.915000 audit[5863]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc46f99c70 a2=3 a3=0 items=0 ppid=1 pid=5863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:53.915000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:53.983855 kernel: audit: type=1327 audit(1734100673.915:1578): proctitle=737368643A20636F7265205B707269765D Dec 13 14:37:53.949000 audit[5863]: USER_START pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.006584 kernel: audit: type=1105 audit(1734100673.949:1579): pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:53.954000 audit[5865]: CRED_ACQ pid=5865 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.022816 kernel: audit: type=1103 audit(1734100673.954:1580): pid=5865 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.472272 sshd[5863]: pam_unix(sshd:session): session closed for user core Dec 13 14:37:54.473000 audit[5863]: USER_END pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.476044 systemd-logind[1399]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:37:54.477672 systemd[1]: sshd@25-10.200.8.37:22-10.200.16.10:49720.service: Deactivated successfully. Dec 13 14:37:54.478601 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:37:54.480498 systemd-logind[1399]: Removed session 28. Dec 13 14:37:54.473000 audit[5863]: CRED_DISP pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.508218 kernel: audit: type=1106 audit(1734100674.473:1581): pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.508349 kernel: audit: type=1104 audit(1734100674.473:1582): pid=5863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:37:54.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.37:22-10.200.16.10:49720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:55.366175 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.9Dc1Vo.mount: Deactivated successfully. Dec 13 14:37:59.592348 systemd[1]: Started sshd@26-10.200.8.37:22-10.200.16.10:36850.service. Dec 13 14:37:59.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.37:22-10.200.16.10:36850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:37:59.598311 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:37:59.598406 kernel: audit: type=1130 audit(1734100679.592:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.37:22-10.200.16.10:36850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:00.309000 audit[5893]: USER_ACCT pid=5893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.311531 sshd[5893]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:00.309000 audit[5893]: CRED_ACQ pid=5893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.330487 sshd[5893]: Accepted publickey for core from 10.200.16.10 port 36850 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:38:00.330818 kernel: audit: type=1101 audit(1734100680.309:1585): pid=5893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.330876 kernel: audit: type=1103 audit(1734100680.309:1586): pid=5893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.338240 systemd[1]: Started session-29.scope. Dec 13 14:38:00.339651 systemd-logind[1399]: New session 29 of user core. Dec 13 14:38:00.309000 audit[5893]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ca84830 a2=3 a3=0 items=0 ppid=1 pid=5893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:00.361866 kernel: audit: type=1006 audit(1734100680.309:1587): pid=5893 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 14:38:00.361916 kernel: audit: type=1300 audit(1734100680.309:1587): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5ca84830 a2=3 a3=0 items=0 ppid=1 pid=5893 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:00.309000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:00.344000 audit[5893]: USER_START pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.401988 kernel: audit: type=1327 audit(1734100680.309:1587): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:00.402121 kernel: audit: type=1105 audit(1734100680.344:1588): pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.402157 kernel: audit: type=1103 audit(1734100680.348:1589): pid=5895 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.348000 audit[5895]: CRED_ACQ pid=5895 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.878130 sshd[5893]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:00.878000 audit[5893]: USER_END pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.885897 systemd[1]: sshd@26-10.200.8.37:22-10.200.16.10:36850.service: Deactivated successfully. Dec 13 14:38:00.886674 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 14:38:00.888245 systemd-logind[1399]: Session 29 logged out. Waiting for processes to exit. Dec 13 14:38:00.889200 systemd-logind[1399]: Removed session 29. Dec 13 14:38:00.898821 kernel: audit: type=1106 audit(1734100680.878:1590): pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.878000 audit[5893]: CRED_DISP pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:00.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.37:22-10.200.16.10:36850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:00.913867 kernel: audit: type=1104 audit(1734100680.878:1591): pid=5893 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:05.999630 systemd[1]: Started sshd@27-10.200.8.37:22-10.200.16.10:36858.service. Dec 13 14:38:05.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.8.37:22-10.200.16.10:36858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:06.005508 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:38:06.005590 kernel: audit: type=1130 audit(1734100685.999:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.8.37:22-10.200.16.10:36858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:06.712000 audit[5907]: USER_ACCT pid=5907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.736760 sshd[5907]: Accepted publickey for core from 10.200.16.10 port 36858 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:38:06.737150 kernel: audit: type=1101 audit(1734100686.712:1594): pid=5907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.737335 sshd[5907]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:06.735000 audit[5907]: CRED_ACQ pid=5907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.742721 systemd[1]: Started session-30.scope. Dec 13 14:38:06.743857 systemd-logind[1399]: New session 30 of user core. Dec 13 14:38:06.763624 kernel: audit: type=1103 audit(1734100686.735:1595): pid=5907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.763746 kernel: audit: type=1006 audit(1734100686.736:1596): pid=5907 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Dec 13 14:38:06.763782 kernel: audit: type=1300 audit(1734100686.736:1596): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a4230c0 a2=3 a3=0 items=0 ppid=1 pid=5907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.736000 audit[5907]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a4230c0 a2=3 a3=0 items=0 ppid=1 pid=5907 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:06.736000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:06.780868 kernel: audit: type=1327 audit(1734100686.736:1596): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:06.748000 audit[5907]: USER_START pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.786823 kernel: audit: type=1105 audit(1734100686.748:1597): pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.750000 audit[5909]: CRED_ACQ pid=5909 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:06.804935 kernel: audit: type=1103 audit(1734100686.750:1598): pid=5909 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:07.276430 sshd[5907]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:07.277000 audit[5907]: USER_END pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:07.279998 systemd-logind[1399]: Session 30 logged out. Waiting for processes to exit. Dec 13 14:38:07.281285 systemd[1]: sshd@27-10.200.8.37:22-10.200.16.10:36858.service: Deactivated successfully. Dec 13 14:38:07.282083 systemd[1]: session-30.scope: Deactivated successfully. Dec 13 14:38:07.283343 systemd-logind[1399]: Removed session 30. Dec 13 14:38:07.277000 audit[5907]: CRED_DISP pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:07.310552 kernel: audit: type=1106 audit(1734100687.277:1599): pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:07.310651 kernel: audit: type=1104 audit(1734100687.277:1600): pid=5907 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:07.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.8.37:22-10.200.16.10:36858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:12.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.8.37:22-10.200.16.10:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:12.396338 systemd[1]: Started sshd@28-10.200.8.37:22-10.200.16.10:41832.service. Dec 13 14:38:12.403980 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:38:12.404247 kernel: audit: type=1130 audit(1734100692.395:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.8.37:22-10.200.16.10:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:12.517095 systemd[1]: run-containerd-runc-k8s.io-dd5e22f88bbb9c5e17272f21406975385b5e19bd6d83eb6174014ab609ee8aec-runc.S50qrI.mount: Deactivated successfully. Dec 13 14:38:12.549092 systemd[1]: run-containerd-runc-k8s.io-4fa63bbced00b22d60b1c3b4428980e71c45d97bdb4f91f5d25d2918c92435c6-runc.rvIDcw.mount: Deactivated successfully. Dec 13 14:38:13.116000 audit[5919]: USER_ACCT pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.135040 sshd[5919]: Accepted publickey for core from 10.200.16.10 port 41832 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:38:13.133000 audit[5919]: CRED_ACQ pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.135491 sshd[5919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:13.140959 systemd[1]: Started session-31.scope. Dec 13 14:38:13.142071 systemd-logind[1399]: New session 31 of user core. Dec 13 14:38:13.151441 kernel: audit: type=1101 audit(1734100693.116:1603): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.151543 kernel: audit: type=1103 audit(1734100693.133:1604): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.152121 kernel: audit: type=1006 audit(1734100693.133:1605): pid=5919 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Dec 13 14:38:13.133000 audit[5919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c14a7a0 a2=3 a3=0 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:13.161817 kernel: audit: type=1300 audit(1734100693.133:1605): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c14a7a0 a2=3 a3=0 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:13.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:13.177815 kernel: audit: type=1327 audit(1734100693.133:1605): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:13.146000 audit[5919]: USER_START pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.183820 kernel: audit: type=1105 audit(1734100693.146:1606): pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.148000 audit[5965]: CRED_ACQ pid=5965 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.215819 kernel: audit: type=1103 audit(1734100693.148:1607): pid=5965 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.678887 sshd[5919]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:13.678000 audit[5919]: USER_END pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.682539 systemd-logind[1399]: Session 31 logged out. Waiting for processes to exit. Dec 13 14:38:13.683970 systemd[1]: sshd@28-10.200.8.37:22-10.200.16.10:41832.service: Deactivated successfully. Dec 13 14:38:13.684711 systemd[1]: session-31.scope: Deactivated successfully. Dec 13 14:38:13.686285 systemd-logind[1399]: Removed session 31. Dec 13 14:38:13.700908 kernel: audit: type=1106 audit(1734100693.678:1608): pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.700983 kernel: audit: type=1104 audit(1734100693.678:1609): pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.678000 audit[5919]: CRED_DISP pid=5919 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:13.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.200.8.37:22-10.200.16.10:41832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:18.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.8.37:22-10.200.16.10:58170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:18.799670 systemd[1]: Started sshd@29-10.200.8.37:22-10.200.16.10:58170.service. Dec 13 14:38:18.804861 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:38:18.804938 kernel: audit: type=1130 audit(1734100698.798:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.8.37:22-10.200.16.10:58170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:19.511000 audit[5975]: USER_ACCT pid=5975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.513677 sshd[5975]: Accepted publickey for core from 10.200.16.10 port 58170 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:38:19.531000 audit[5975]: CRED_ACQ pid=5975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.533705 sshd[5975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:19.539032 systemd[1]: Started session-32.scope. Dec 13 14:38:19.540165 systemd-logind[1399]: New session 32 of user core. Dec 13 14:38:19.549645 kernel: audit: type=1101 audit(1734100699.511:1612): pid=5975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.549733 kernel: audit: type=1103 audit(1734100699.531:1613): pid=5975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.559822 kernel: audit: type=1006 audit(1734100699.531:1614): pid=5975 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Dec 13 14:38:19.531000 audit[5975]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef17b04d0 a2=3 a3=0 items=0 ppid=1 pid=5975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:19.576821 kernel: audit: type=1300 audit(1734100699.531:1614): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef17b04d0 a2=3 a3=0 items=0 ppid=1 pid=5975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:19.531000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:19.543000 audit[5975]: USER_START pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.600487 kernel: audit: type=1327 audit(1734100699.531:1614): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:19.600608 kernel: audit: type=1105 audit(1734100699.543:1615): pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.600639 kernel: audit: type=1103 audit(1734100699.546:1616): pid=5977 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:19.546000 audit[5977]: CRED_ACQ pid=5977 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:20.081350 sshd[5975]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:20.081000 audit[5975]: USER_END pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:20.084518 systemd[1]: sshd@29-10.200.8.37:22-10.200.16.10:58170.service: Deactivated successfully. Dec 13 14:38:20.085339 systemd[1]: session-32.scope: Deactivated successfully. Dec 13 14:38:20.087719 systemd-logind[1399]: Session 32 logged out. Waiting for processes to exit. Dec 13 14:38:20.088629 systemd-logind[1399]: Removed session 32. Dec 13 14:38:20.081000 audit[5975]: CRED_DISP pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:20.116820 kernel: audit: type=1106 audit(1734100700.081:1617): pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:20.116925 kernel: audit: type=1104 audit(1734100700.081:1618): pid=5975 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:38:20.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.200.8.37:22-10.200.16.10:58170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'