Dec 13 02:04:07.084230 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:04:07.084280 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:07.084307 kernel: BIOS-provided physical RAM map: Dec 13 02:04:07.084321 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 02:04:07.084333 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 02:04:07.084347 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 02:04:07.084367 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 02:04:07.084382 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 02:04:07.084396 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 02:04:07.084408 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 02:04:07.084420 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 02:04:07.084433 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 02:04:07.084446 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 02:04:07.084460 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 02:04:07.084481 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 02:04:07.084497 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 02:04:07.084512 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 02:04:07.084527 kernel: NX (Execute Disable) protection: active Dec 13 02:04:07.084543 kernel: efi: EFI v2.70 by EDK II Dec 13 02:04:07.084559 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 02:04:07.084574 kernel: random: crng init done Dec 13 02:04:07.084589 kernel: SMBIOS 2.4 present. Dec 13 02:04:07.084608 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 02:04:07.084623 kernel: Hypervisor detected: KVM Dec 13 02:04:07.084637 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:04:07.084652 kernel: kvm-clock: cpu 0, msr 7f19b001, primary cpu clock Dec 13 02:04:07.084668 kernel: kvm-clock: using sched offset of 12827904304 cycles Dec 13 02:04:07.084684 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:04:07.084699 kernel: tsc: Detected 2299.998 MHz processor Dec 13 02:04:07.084715 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:04:07.084732 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:04:07.084747 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 02:04:07.084766 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:04:07.084782 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 02:04:07.084797 kernel: Using GB pages for direct mapping Dec 13 02:04:07.084840 kernel: Secure boot disabled Dec 13 02:04:07.084855 kernel: ACPI: Early table checksum verification disabled Dec 13 02:04:07.084871 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 02:04:07.084885 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 02:04:07.084900 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 02:04:07.084926 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 02:04:07.084942 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 02:04:07.084959 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 02:04:07.084976 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 02:04:07.084993 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 02:04:07.085009 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 02:04:07.085030 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 02:04:07.085046 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 02:04:07.085062 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 02:04:07.085079 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 02:04:07.085095 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 02:04:07.085112 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 02:04:07.085128 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 02:04:07.085144 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 02:04:07.085160 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 02:04:07.085181 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 02:04:07.085198 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 02:04:07.085214 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:04:07.085230 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:04:07.085247 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:04:07.085263 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 02:04:07.085280 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 02:04:07.085305 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 02:04:07.085322 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 02:04:07.085343 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Dec 13 02:04:07.085359 kernel: Zone ranges: Dec 13 02:04:07.085376 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:04:07.085392 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 02:04:07.085409 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:04:07.085426 kernel: Movable zone start for each node Dec 13 02:04:07.085443 kernel: Early memory node ranges Dec 13 02:04:07.085459 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 02:04:07.085476 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 02:04:07.085497 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 02:04:07.085514 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 02:04:07.085531 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 02:04:07.085548 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 02:04:07.085565 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 02:04:07.085581 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:04:07.085598 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 02:04:07.085615 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 02:04:07.085632 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 02:04:07.085652 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 02:04:07.085669 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 02:04:07.085685 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:04:07.085702 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:04:07.085719 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:04:07.085735 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:04:07.085752 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:04:07.085769 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:04:07.085785 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:04:07.085826 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:04:07.085843 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:04:07.085860 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 02:04:07.085877 kernel: Booting paravirtualized kernel on KVM Dec 13 02:04:07.085893 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:04:07.085910 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:04:07.085927 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:04:07.085943 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:04:07.085959 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:04:07.085980 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:04:07.085997 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:04:07.086013 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 02:04:07.086030 kernel: Policy zone: Normal Dec 13 02:04:07.086048 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:07.086065 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:04:07.086081 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 02:04:07.086097 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:04:07.086114 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:04:07.086135 kernel: Memory: 7515400K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 344884K reserved, 0K cma-reserved) Dec 13 02:04:07.086152 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:04:07.086169 kernel: Kernel/User page tables isolation: enabled Dec 13 02:04:07.086184 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:04:07.086201 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:04:07.086218 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:04:07.086236 kernel: rcu: RCU event tracing is enabled. Dec 13 02:04:07.086253 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:04:07.086274 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:04:07.086311 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:04:07.086330 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:04:07.086350 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:04:07.086368 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:04:07.086386 kernel: Console: colour dummy device 80x25 Dec 13 02:04:07.086404 kernel: printk: console [ttyS0] enabled Dec 13 02:04:07.086421 kernel: ACPI: Core revision 20210730 Dec 13 02:04:07.086439 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:04:07.086456 kernel: x2apic enabled Dec 13 02:04:07.086476 kernel: Switched APIC routing to physical x2apic. Dec 13 02:04:07.086493 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 02:04:07.086511 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:04:07.086528 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 02:04:07.086545 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 02:04:07.086563 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 02:04:07.086582 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:04:07.086604 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:04:07.086621 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:04:07.086639 kernel: Spectre V2 : Mitigation: IBRS Dec 13 02:04:07.086657 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:04:07.086674 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:04:07.086690 kernel: RETBleed: Mitigation: IBRS Dec 13 02:04:07.086708 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:04:07.086726 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 02:04:07.086744 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:04:07.086766 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 02:04:07.086784 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:04:07.086827 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:04:07.086845 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:04:07.086863 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:04:07.086880 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:04:07.086898 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:04:07.086915 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:04:07.086933 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:04:07.086955 kernel: LSM: Security Framework initializing Dec 13 02:04:07.086972 kernel: SELinux: Initializing. Dec 13 02:04:07.086990 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:04:07.087008 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:04:07.087026 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 02:04:07.087044 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 02:04:07.087058 kernel: signal: max sigframe size: 1776 Dec 13 02:04:07.087073 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:04:07.087091 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:04:07.087111 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:04:07.087129 kernel: x86: Booting SMP configuration: Dec 13 02:04:07.087146 kernel: .... node #0, CPUs: #1 Dec 13 02:04:07.087163 kernel: kvm-clock: cpu 1, msr 7f19b041, secondary cpu clock Dec 13 02:04:07.087182 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:04:07.087201 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:04:07.087218 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:04:07.087237 kernel: smpboot: Max logical packages: 1 Dec 13 02:04:07.087259 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 02:04:07.087276 kernel: devtmpfs: initialized Dec 13 02:04:07.087302 kernel: x86/mm: Memory block size: 128MB Dec 13 02:04:07.087320 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 02:04:07.087338 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:04:07.087356 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:04:07.087373 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:04:07.087390 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:04:07.087408 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:04:07.087429 kernel: audit: type=2000 audit(1734055446.184:1): state=initialized audit_enabled=0 res=1 Dec 13 02:04:07.087445 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:04:07.087461 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:04:07.087479 kernel: cpuidle: using governor menu Dec 13 02:04:07.087496 kernel: ACPI: bus type PCI registered Dec 13 02:04:07.087514 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:04:07.087532 kernel: dca service started, version 1.12.1 Dec 13 02:04:07.087550 kernel: PCI: Using configuration type 1 for base access Dec 13 02:04:07.087567 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:04:07.087588 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:04:07.087606 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:04:07.087624 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:04:07.087641 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:04:07.087659 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:04:07.087677 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:04:07.087694 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:04:07.087712 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:04:07.087729 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:04:07.087750 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:04:07.087767 kernel: ACPI: Interpreter enabled Dec 13 02:04:07.087785 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:04:07.087815 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:04:07.087833 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:04:07.087850 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:04:07.087868 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:04:07.088080 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:04:07.088248 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:04:07.088269 kernel: PCI host bridge to bus 0000:00 Dec 13 02:04:07.088439 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:04:07.088589 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:04:07.088730 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:04:07.088897 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 02:04:07.089043 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:04:07.089222 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:04:07.089415 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 02:04:07.089595 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 02:04:07.097870 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:04:07.098085 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 02:04:07.098262 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 02:04:07.098448 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 02:04:07.098632 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:04:07.098825 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 02:04:07.098999 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 02:04:07.099174 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:04:07.099351 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 02:04:07.099515 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 02:04:07.099543 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:04:07.099562 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:04:07.099580 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:04:07.099598 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:04:07.099616 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:04:07.099633 kernel: iommu: Default domain type: Translated Dec 13 02:04:07.099651 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:04:07.099669 kernel: vgaarb: loaded Dec 13 02:04:07.099687 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:04:07.099708 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:04:07.099726 kernel: PTP clock support registered Dec 13 02:04:07.099743 kernel: Registered efivars operations Dec 13 02:04:07.099761 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:04:07.099779 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:04:07.099795 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 02:04:07.099828 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 02:04:07.099845 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 02:04:07.099863 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 02:04:07.099883 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 02:04:07.099901 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:04:07.099918 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:04:07.099937 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:04:07.099954 kernel: pnp: PnP ACPI init Dec 13 02:04:07.099971 kernel: pnp: PnP ACPI: found 7 devices Dec 13 02:04:07.099989 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:04:07.100007 kernel: NET: Registered PF_INET protocol family Dec 13 02:04:07.100025 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:04:07.100047 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 02:04:07.100065 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:04:07.100083 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:04:07.100101 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 02:04:07.100118 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 02:04:07.100137 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:04:07.100154 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 02:04:07.100172 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:04:07.100194 kernel: NET: Registered PF_XDP protocol family Dec 13 02:04:07.100357 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:04:07.100507 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:04:07.100653 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:04:07.100798 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 02:04:07.100992 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:04:07.101017 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:04:07.101040 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 02:04:07.101057 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 02:04:07.101076 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:04:07.101093 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 02:04:07.101112 kernel: clocksource: Switched to clocksource tsc Dec 13 02:04:07.101130 kernel: Initialise system trusted keyrings Dec 13 02:04:07.101148 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 02:04:07.101165 kernel: Key type asymmetric registered Dec 13 02:04:07.101183 kernel: Asymmetric key parser 'x509' registered Dec 13 02:04:07.101204 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:04:07.101222 kernel: io scheduler mq-deadline registered Dec 13 02:04:07.101240 kernel: io scheduler kyber registered Dec 13 02:04:07.101258 kernel: io scheduler bfq registered Dec 13 02:04:07.101275 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:04:07.101302 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 02:04:07.101476 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 02:04:07.101500 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 02:04:07.101670 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 02:04:07.101698 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 02:04:07.101880 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 02:04:07.101904 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:04:07.101923 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:04:07.101941 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 02:04:07.101959 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 02:04:07.101976 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 02:04:07.102150 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 02:04:07.102180 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:04:07.102198 kernel: i8042: Warning: Keylock active Dec 13 02:04:07.102216 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:04:07.102233 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:04:07.102406 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:04:07.102563 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:04:07.102716 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:04:06 UTC (1734055446) Dec 13 02:04:07.103420 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:04:07.103458 kernel: intel_pstate: CPU model not supported Dec 13 02:04:07.103478 kernel: pstore: Registered efi as persistent store backend Dec 13 02:04:07.103497 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:04:07.103516 kernel: Segment Routing with IPv6 Dec 13 02:04:07.103534 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:04:07.103552 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:04:07.103570 kernel: Key type dns_resolver registered Dec 13 02:04:07.103587 kernel: IPI shorthand broadcast: enabled Dec 13 02:04:07.103603 kernel: sched_clock: Marking stable (744005222, 137454266)->(911848703, -30389215) Dec 13 02:04:07.103624 kernel: registered taskstats version 1 Dec 13 02:04:07.103643 kernel: Loading compiled-in X.509 certificates Dec 13 02:04:07.103661 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:04:07.103678 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:04:07.103692 kernel: Key type .fscrypt registered Dec 13 02:04:07.103709 kernel: Key type fscrypt-provisioning registered Dec 13 02:04:07.103725 kernel: pstore: Using crash dump compression: deflate Dec 13 02:04:07.103742 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:04:07.103759 kernel: ima: No architecture policies found Dec 13 02:04:07.103813 kernel: clk: Disabling unused clocks Dec 13 02:04:07.103831 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:04:07.103848 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:04:07.103865 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:04:07.103882 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:04:07.103899 kernel: Run /init as init process Dec 13 02:04:07.103916 kernel: with arguments: Dec 13 02:04:07.103932 kernel: /init Dec 13 02:04:07.103949 kernel: with environment: Dec 13 02:04:07.103969 kernel: HOME=/ Dec 13 02:04:07.103986 kernel: TERM=linux Dec 13 02:04:07.104003 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:04:07.104024 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:04:07.104044 systemd[1]: Detected virtualization kvm. Dec 13 02:04:07.104063 systemd[1]: Detected architecture x86-64. Dec 13 02:04:07.104080 systemd[1]: Running in initrd. Dec 13 02:04:07.104100 systemd[1]: No hostname configured, using default hostname. Dec 13 02:04:07.104117 systemd[1]: Hostname set to . Dec 13 02:04:07.104135 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:04:07.104153 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:04:07.104170 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:04:07.104188 systemd[1]: Reached target cryptsetup.target. Dec 13 02:04:07.104205 systemd[1]: Reached target paths.target. Dec 13 02:04:07.104222 systemd[1]: Reached target slices.target. Dec 13 02:04:07.104244 systemd[1]: Reached target swap.target. Dec 13 02:04:07.104262 systemd[1]: Reached target timers.target. Dec 13 02:04:07.104286 systemd[1]: Listening on iscsid.socket. Dec 13 02:04:07.104309 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:04:07.104327 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:04:07.104345 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:04:07.104363 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:04:07.104380 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:04:07.104400 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:04:07.104419 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:04:07.104455 systemd[1]: Reached target sockets.target. Dec 13 02:04:07.104477 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:04:07.104494 systemd[1]: Finished network-cleanup.service. Dec 13 02:04:07.104513 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:04:07.104531 systemd[1]: Starting systemd-journald.service... Dec 13 02:04:07.104553 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:04:07.104571 systemd[1]: Starting systemd-resolved.service... Dec 13 02:04:07.104589 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:04:07.104608 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:04:07.104631 systemd-journald[189]: Journal started Dec 13 02:04:07.104721 systemd-journald[189]: Runtime Journal (/run/log/journal/b32af483ba7ee460e7d494dd3b174b2f) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:04:07.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.114400 kernel: audit: type=1130 audit(1734055447.107:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.114448 systemd[1]: Started systemd-journald.service. Dec 13 02:04:07.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.116217 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:04:07.126924 kernel: audit: type=1130 audit(1734055447.113:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.126957 kernel: audit: type=1130 audit(1734055447.119:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.124654 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:04:07.124900 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 02:04:07.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.139216 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:04:07.153489 kernel: audit: type=1130 audit(1734055447.136:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.146951 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:04:07.160612 systemd-resolved[191]: Positive Trust Anchors: Dec 13 02:04:07.160635 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:04:07.160693 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:04:07.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.162772 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:04:07.166859 kernel: audit: type=1130 audit(1734055447.161:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.167216 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 02:04:07.170865 systemd[1]: Started systemd-resolved.service. Dec 13 02:04:07.171024 systemd[1]: Reached target nss-lookup.target. Dec 13 02:04:07.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.174856 kernel: audit: type=1130 audit(1734055447.169:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.190581 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:04:07.205269 kernel: audit: type=1130 audit(1734055447.192:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.195161 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:04:07.211242 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:04:07.214265 dracut-cmdline[205]: dracut-dracut-053 Dec 13 02:04:07.217916 kernel: Bridge firewalling registered Dec 13 02:04:07.217338 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 02:04:07.221908 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:04:07.251828 kernel: SCSI subsystem initialized Dec 13 02:04:07.270557 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:04:07.270628 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:04:07.270653 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:04:07.277052 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 02:04:07.279679 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:04:07.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.292154 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:04:07.298972 kernel: audit: type=1130 audit(1734055447.289:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.306016 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:04:07.316932 kernel: audit: type=1130 audit(1734055447.308:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.320837 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:04:07.341840 kernel: iscsi: registered transport (tcp) Dec 13 02:04:07.368012 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:04:07.368101 kernel: QLogic iSCSI HBA Driver Dec 13 02:04:07.411685 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:04:07.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.416270 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:04:07.472859 kernel: raid6: avx2x4 gen() 18329 MB/s Dec 13 02:04:07.489847 kernel: raid6: avx2x4 xor() 8309 MB/s Dec 13 02:04:07.507853 kernel: raid6: avx2x2 gen() 18251 MB/s Dec 13 02:04:07.524851 kernel: raid6: avx2x2 xor() 18510 MB/s Dec 13 02:04:07.541850 kernel: raid6: avx2x1 gen() 14390 MB/s Dec 13 02:04:07.558846 kernel: raid6: avx2x1 xor() 16079 MB/s Dec 13 02:04:07.575852 kernel: raid6: sse2x4 gen() 11047 MB/s Dec 13 02:04:07.592856 kernel: raid6: sse2x4 xor() 6701 MB/s Dec 13 02:04:07.609872 kernel: raid6: sse2x2 gen() 11975 MB/s Dec 13 02:04:07.626853 kernel: raid6: sse2x2 xor() 7363 MB/s Dec 13 02:04:07.643870 kernel: raid6: sse2x1 gen() 10434 MB/s Dec 13 02:04:07.661871 kernel: raid6: sse2x1 xor() 4725 MB/s Dec 13 02:04:07.661952 kernel: raid6: using algorithm avx2x4 gen() 18329 MB/s Dec 13 02:04:07.661976 kernel: raid6: .... xor() 8309 MB/s, rmw enabled Dec 13 02:04:07.663620 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:04:07.679851 kernel: xor: automatically using best checksumming function avx Dec 13 02:04:07.793843 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:04:07.805768 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:04:07.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.804000 audit: BPF prog-id=7 op=LOAD Dec 13 02:04:07.804000 audit: BPF prog-id=8 op=LOAD Dec 13 02:04:07.807446 systemd[1]: Starting systemd-udevd.service... Dec 13 02:04:07.824720 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 02:04:07.831815 systemd[1]: Started systemd-udevd.service. Dec 13 02:04:07.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.834202 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:04:07.853627 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation Dec 13 02:04:07.889581 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:04:07.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:07.890899 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:04:07.956098 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:04:07.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:08.037829 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:04:08.061533 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:04:08.061602 kernel: AES CTR mode by8 optimization enabled Dec 13 02:04:08.074899 kernel: scsi host0: Virtio SCSI HBA Dec 13 02:04:08.078827 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 02:04:08.171023 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 02:04:08.191277 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 02:04:08.191454 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 02:04:08.191593 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 02:04:08.191727 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 02:04:08.191912 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:04:08.191936 kernel: GPT:17805311 != 25165823 Dec 13 02:04:08.191957 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:04:08.191978 kernel: GPT:17805311 != 25165823 Dec 13 02:04:08.191998 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:04:08.192024 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:08.192046 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 02:04:08.240834 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (442) Dec 13 02:04:08.242833 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:04:08.253085 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:04:08.278966 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:04:08.309674 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:04:08.324997 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:04:08.336961 systemd[1]: Starting disk-uuid.service... Dec 13 02:04:08.358102 disk-uuid[509]: Primary Header is updated. Dec 13 02:04:08.358102 disk-uuid[509]: Secondary Entries is updated. Dec 13 02:04:08.358102 disk-uuid[509]: Secondary Header is updated. Dec 13 02:04:08.384939 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:08.390828 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:08.409834 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:09.409491 disk-uuid[510]: The operation has completed successfully. Dec 13 02:04:09.417961 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:04:09.474798 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:04:09.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.474959 systemd[1]: Finished disk-uuid.service. Dec 13 02:04:09.496989 systemd[1]: Starting verity-setup.service... Dec 13 02:04:09.524844 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:04:09.602091 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:04:09.603570 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:04:09.616575 systemd[1]: Finished verity-setup.service. Dec 13 02:04:09.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.706673 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:04:09.706584 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:04:09.714309 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:04:09.761005 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:09.761046 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:09.761069 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:09.715399 systemd[1]: Starting ignition-setup.service... Dec 13 02:04:09.779725 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:09.730276 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:04:09.787854 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:04:09.803940 systemd[1]: Finished ignition-setup.service. Dec 13 02:04:09.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.813035 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:04:09.844610 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:04:09.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.852000 audit: BPF prog-id=9 op=LOAD Dec 13 02:04:09.854998 systemd[1]: Starting systemd-networkd.service... Dec 13 02:04:09.887160 systemd-networkd[684]: lo: Link UP Dec 13 02:04:09.887175 systemd-networkd[684]: lo: Gained carrier Dec 13 02:04:09.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.888143 systemd-networkd[684]: Enumeration completed Dec 13 02:04:09.888487 systemd-networkd[684]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:04:09.889026 systemd[1]: Started systemd-networkd.service. Dec 13 02:04:09.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.890834 systemd-networkd[684]: eth0: Link UP Dec 13 02:04:09.959950 iscsid[689]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:04:09.959950 iscsid[689]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 02:04:09.959950 iscsid[689]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:04:09.959950 iscsid[689]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:04:09.959950 iscsid[689]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:04:09.959950 iscsid[689]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:04:09.959950 iscsid[689]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:04:10.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.890842 systemd-networkd[684]: eth0: Gained carrier Dec 13 02:04:09.895250 systemd[1]: Reached target network.target. Dec 13 02:04:10.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.901910 systemd-networkd[684]: eth0: DHCPv4 address 10.128.0.42/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:04:10.119474 ignition[656]: Ignition 2.14.0 Dec 13 02:04:10.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:09.917259 systemd[1]: Starting iscsiuio.service... Dec 13 02:04:10.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.119487 ignition[656]: Stage: fetch-offline Dec 13 02:04:09.927493 systemd[1]: Started iscsiuio.service. Dec 13 02:04:10.119575 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:09.947533 systemd[1]: Starting iscsid.service... Dec 13 02:04:10.119636 ignition[656]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:10.026207 systemd[1]: Started iscsid.service. Dec 13 02:04:10.143689 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:10.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.034348 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:04:10.143946 ignition[656]: parsed url from cmdline: "" Dec 13 02:04:10.063415 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:04:10.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.143954 ignition[656]: no config URL provided Dec 13 02:04:10.095192 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:04:10.143962 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:04:10.109939 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:04:10.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.143974 ignition[656]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:04:10.117932 systemd[1]: Reached target remote-fs.target. Dec 13 02:04:10.143982 ignition[656]: failed to fetch config: resource requires networking Dec 13 02:04:10.119165 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:04:10.144377 ignition[656]: Ignition finished successfully Dec 13 02:04:10.143388 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:04:10.179893 ignition[708]: Ignition 2.14.0 Dec 13 02:04:10.152386 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:04:10.179904 ignition[708]: Stage: fetch Dec 13 02:04:10.168295 systemd[1]: Starting ignition-fetch.service... Dec 13 02:04:10.180032 ignition[708]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:10.199552 unknown[708]: fetched base config from "system" Dec 13 02:04:10.180057 ignition[708]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:10.199573 unknown[708]: fetched base config from "system" Dec 13 02:04:10.186231 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:10.199589 unknown[708]: fetched user config from "gcp" Dec 13 02:04:10.186405 ignition[708]: parsed url from cmdline: "" Dec 13 02:04:10.210339 systemd[1]: Finished ignition-fetch.service. Dec 13 02:04:10.186413 ignition[708]: no config URL provided Dec 13 02:04:10.226255 systemd[1]: Starting ignition-kargs.service... Dec 13 02:04:10.186419 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:04:10.249818 systemd[1]: Finished ignition-kargs.service. Dec 13 02:04:10.186430 ignition[708]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:04:10.259226 systemd[1]: Starting ignition-disks.service... Dec 13 02:04:10.186465 ignition[708]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 02:04:10.288395 systemd[1]: Finished ignition-disks.service. Dec 13 02:04:10.194890 ignition[708]: GET result: OK Dec 13 02:04:10.306246 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:04:10.194954 ignition[708]: parsing config with SHA512: a1cd9c200702b99e9d97d3fa10ea7d8c7d0331b18f720639ef50c2df23318e32b664f5ca0f12fcb2dcb31c5028bc867d5eed51e91c896b847408e1190fa25c1c Dec 13 02:04:10.321957 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:04:10.201604 ignition[708]: fetch: fetch complete Dec 13 02:04:10.335961 systemd[1]: Reached target local-fs.target. Dec 13 02:04:10.201612 ignition[708]: fetch: fetch passed Dec 13 02:04:10.336090 systemd[1]: Reached target sysinit.target. Dec 13 02:04:10.201660 ignition[708]: Ignition finished successfully Dec 13 02:04:10.356960 systemd[1]: Reached target basic.target. Dec 13 02:04:10.239708 ignition[714]: Ignition 2.14.0 Dec 13 02:04:10.358239 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:04:10.239716 ignition[714]: Stage: kargs Dec 13 02:04:10.239882 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:10.239916 ignition[714]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:10.247317 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:10.248852 ignition[714]: kargs: kargs passed Dec 13 02:04:10.248903 ignition[714]: Ignition finished successfully Dec 13 02:04:10.269749 ignition[720]: Ignition 2.14.0 Dec 13 02:04:10.269760 ignition[720]: Stage: disks Dec 13 02:04:10.269922 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:10.269954 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:10.277588 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:10.278898 ignition[720]: disks: disks passed Dec 13 02:04:10.278945 ignition[720]: Ignition finished successfully Dec 13 02:04:10.409019 systemd-fsck[728]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:04:10.631782 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:04:10.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.642223 systemd[1]: Mounting sysroot.mount... Dec 13 02:04:10.669843 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:04:10.670470 systemd[1]: Mounted sysroot.mount. Dec 13 02:04:10.670820 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:04:10.687941 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:04:10.696573 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:04:10.696618 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:04:10.696650 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:04:10.708323 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:04:10.790149 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (734) Dec 13 02:04:10.790185 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:10.790202 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:10.790218 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:10.739847 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:04:10.820977 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:10.803337 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:04:10.815626 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:04:10.845944 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:04:10.855960 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:04:10.865977 initrd-setup-root[773]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:04:10.875953 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:04:10.906979 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:04:10.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.908155 systemd[1]: Starting ignition-mount.service... Dec 13 02:04:10.935942 systemd[1]: Starting sysroot-boot.service... Dec 13 02:04:10.944165 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:10.944305 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:10.969969 ignition[799]: INFO : Ignition 2.14.0 Dec 13 02:04:10.969969 ignition[799]: INFO : Stage: mount Dec 13 02:04:10.969969 ignition[799]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:10.969969 ignition[799]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:11.055746 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (809) Dec 13 02:04:11.055811 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:04:11.055836 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:04:11.055859 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:04:10.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:11.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:10.975046 systemd[1]: Finished ignition-mount.service. Dec 13 02:04:11.061349 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:11.061349 ignition[799]: INFO : mount: mount passed Dec 13 02:04:11.061349 ignition[799]: INFO : Ignition finished successfully Dec 13 02:04:11.112974 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:04:10.979148 systemd[1]: Starting ignition-files.service... Dec 13 02:04:10.998833 systemd[1]: Finished sysroot-boot.service. Dec 13 02:04:11.019950 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:04:11.137034 ignition[828]: INFO : Ignition 2.14.0 Dec 13 02:04:11.137034 ignition[828]: INFO : Stage: files Dec 13 02:04:11.137034 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:11.137034 ignition[828]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:11.137034 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:11.137034 ignition[828]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:04:11.137034 ignition[828]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:04:11.137034 ignition[828]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:04:11.137034 ignition[828]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:04:11.137034 ignition[828]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:04:11.137034 ignition[828]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:04:11.273994 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (830) Dec 13 02:04:11.083167 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1572451274" Dec 13 02:04:11.282940 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1572451274": device or resource busy Dec 13 02:04:11.282940 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1572451274", trying btrfs: device or resource busy Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1572451274" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1572451274" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1572451274" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1572451274" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:04:11.282940 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 02:04:11.134568 unknown[828]: wrote ssh authorized keys file for user: core Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4077344009" Dec 13 02:04:11.501960 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4077344009": device or resource busy Dec 13 02:04:11.501960 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4077344009", trying btrfs: device or resource busy Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4077344009" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4077344009" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem4077344009" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem4077344009" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:04:11.501960 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3602686527" Dec 13 02:04:11.750017 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3602686527": device or resource busy Dec 13 02:04:11.750017 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3602686527", trying btrfs: device or resource busy Dec 13 02:04:11.750017 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3602686527" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3602686527" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3602686527" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3602686527" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1483985607" Dec 13 02:04:11.994964 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1483985607": device or resource busy Dec 13 02:04:11.994964 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1483985607", trying btrfs: device or resource busy Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1483985607" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1483985607" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem1483985607" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem1483985607" Dec 13 02:04:11.994964 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 02:04:11.931953 systemd-networkd[684]: eth0: Gained IPv6LL Dec 13 02:04:12.243022 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:04:12.243022 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 02:04:12.243022 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 02:04:12.547284 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 02:04:12.547284 ignition[828]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 02:04:12.773091 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 02:04:12.773123 kernel: audit: type=1130 audit(1734055452.564:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.773141 kernel: audit: type=1130 audit(1734055452.644:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.773164 kernel: audit: type=1130 audit(1734055452.684:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.773178 kernel: audit: type=1131 audit(1734055452.684:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:04:12.773356 ignition[828]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:04:12.773356 ignition[828]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:04:12.773356 ignition[828]: INFO : files: files passed Dec 13 02:04:12.773356 ignition[828]: INFO : Ignition finished successfully Dec 13 02:04:13.127981 kernel: audit: type=1130 audit(1734055452.803:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.128049 kernel: audit: type=1131 audit(1734055452.803:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.128075 kernel: audit: type=1130 audit(1734055452.942:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.128098 kernel: audit: type=1131 audit(1734055453.058:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.555985 systemd[1]: Finished ignition-files.service. Dec 13 02:04:12.575909 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:04:13.160983 initrd-setup-root-after-ignition[851]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:04:12.609156 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:04:12.610229 systemd[1]: Starting ignition-quench.service... Dec 13 02:04:12.629460 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:04:12.646548 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:04:12.646689 systemd[1]: Finished ignition-quench.service. Dec 13 02:04:12.686378 systemd[1]: Reached target ignition-complete.target. Dec 13 02:04:12.763240 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:04:13.322005 kernel: audit: type=1131 audit(1734055453.291:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.793425 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:04:12.793546 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:04:13.371986 kernel: audit: type=1131 audit(1734055453.336:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.805112 systemd[1]: Reached target initrd-fs.target. Dec 13 02:04:13.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.879109 systemd[1]: Reached target initrd.target. Dec 13 02:04:13.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.900056 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:04:13.414016 ignition[866]: INFO : Ignition 2.14.0 Dec 13 02:04:13.414016 ignition[866]: INFO : Stage: umount Dec 13 02:04:13.414016 ignition[866]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:04:13.414016 ignition[866]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 02:04:12.901242 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:04:13.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.491111 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 02:04:13.491111 ignition[866]: INFO : umount: umount passed Dec 13 02:04:13.491111 ignition[866]: INFO : Ignition finished successfully Dec 13 02:04:13.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.540123 iscsid[689]: iscsid shutting down. Dec 13 02:04:13.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.927465 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:04:13.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.945594 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:04:13.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:12.992557 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:04:13.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.002317 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:04:13.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.020335 systemd[1]: Stopped target timers.target. Dec 13 02:04:13.039275 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:04:13.039488 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:04:13.060523 systemd[1]: Stopped target initrd.target. Dec 13 02:04:13.101281 systemd[1]: Stopped target basic.target. Dec 13 02:04:13.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.114278 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:04:13.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.136252 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:04:13.151256 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:04:13.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.169289 systemd[1]: Stopped target remote-fs.target. Dec 13 02:04:13.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.191265 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:04:13.216269 systemd[1]: Stopped target sysinit.target. Dec 13 02:04:13.231249 systemd[1]: Stopped target local-fs.target. Dec 13 02:04:13.247259 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:04:13.263229 systemd[1]: Stopped target swap.target. Dec 13 02:04:13.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.277170 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:04:13.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.826000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:04:13.277364 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:04:13.293430 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:04:13.330210 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:04:13.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.330409 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:04:13.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.338456 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:04:13.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.338760 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:04:13.382374 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:04:13.382550 systemd[1]: Stopped ignition-files.service. Dec 13 02:04:13.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.398847 systemd[1]: Stopping ignition-mount.service... Dec 13 02:04:13.427360 systemd[1]: Stopping iscsid.service... Dec 13 02:04:13.436353 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:04:13.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.451126 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:04:14.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.451444 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:04:14.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.483231 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:04:13.483410 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:04:13.502707 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:04:14.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.503857 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:04:14.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.503976 systemd[1]: Stopped iscsid.service. Dec 13 02:04:14.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.517723 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:04:14.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.517851 systemd[1]: Stopped ignition-mount.service. Dec 13 02:04:14.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:14.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:13.532540 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:04:13.532657 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:04:13.547650 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:04:13.547784 systemd[1]: Stopped ignition-disks.service. Dec 13 02:04:13.562116 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:04:14.195814 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Dec 13 02:04:13.562190 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:04:13.577028 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:04:13.577097 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:04:13.592012 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:04:13.592086 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:04:13.607041 systemd[1]: Stopped target paths.target. Dec 13 02:04:13.607102 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:04:13.611907 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:04:13.628960 systemd[1]: Stopped target slices.target. Dec 13 02:04:13.642933 systemd[1]: Stopped target sockets.target. Dec 13 02:04:13.658000 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:04:13.658074 systemd[1]: Closed iscsid.socket. Dec 13 02:04:13.665136 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:04:13.665202 systemd[1]: Stopped ignition-setup.service. Dec 13 02:04:13.677179 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:04:13.677242 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:04:13.697241 systemd[1]: Stopping iscsiuio.service... Dec 13 02:04:13.712425 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:04:13.712541 systemd[1]: Stopped iscsiuio.service. Dec 13 02:04:13.720405 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:04:13.720509 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:04:13.743138 systemd[1]: Stopped target network.target. Dec 13 02:04:13.757075 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:04:13.757135 systemd[1]: Closed iscsiuio.socket. Dec 13 02:04:13.772182 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:04:13.775859 systemd-networkd[684]: eth0: DHCPv6 lease lost Dec 13 02:04:13.779209 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:04:13.798296 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:04:13.798421 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:04:13.813662 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:04:13.813780 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:04:13.828701 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:04:13.828742 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:04:13.846014 systemd[1]: Stopping network-cleanup.service... Dec 13 02:04:13.852082 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:04:13.852151 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:04:13.864263 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:04:13.864349 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:04:13.887184 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:04:13.887241 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:04:13.902272 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:04:13.929580 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:04:13.930250 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:04:13.930401 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:04:13.945502 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:04:13.945597 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:04:13.959064 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:04:13.959108 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:04:13.977139 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:04:13.977210 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:04:13.993198 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:04:13.993270 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:04:14.008111 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:04:14.008179 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:04:14.028094 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:04:14.053453 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:04:14.053593 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:04:14.071313 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:04:14.071389 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:04:14.087094 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:04:14.087239 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:04:14.104638 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:04:14.105358 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:04:14.105477 systemd[1]: Stopped network-cleanup.service. Dec 13 02:04:14.119446 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:04:14.119581 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:04:14.135208 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:04:14.151009 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:04:14.167607 systemd[1]: Switching root. Dec 13 02:04:14.209617 systemd-journald[189]: Journal stopped Dec 13 02:04:18.846106 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:04:18.846190 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:04:18.846211 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:04:18.846226 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:04:18.846241 kernel: SELinux: policy capability open_perms=1 Dec 13 02:04:18.846271 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:04:18.846300 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:04:18.846323 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:04:18.846357 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:04:18.846380 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:04:18.846404 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:04:18.846424 systemd[1]: Successfully loaded SELinux policy in 109.489ms. Dec 13 02:04:18.846457 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.747ms. Dec 13 02:04:18.846474 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:04:18.846490 systemd[1]: Detected virtualization kvm. Dec 13 02:04:18.846505 systemd[1]: Detected architecture x86-64. Dec 13 02:04:18.846519 systemd[1]: Detected first boot. Dec 13 02:04:18.846534 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:04:18.846549 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:04:18.846567 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:04:18.846583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:18.846605 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:18.846622 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:18.846641 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 02:04:18.846658 kernel: audit: type=1334 audit(1734055457.969:89): prog-id=12 op=LOAD Dec 13 02:04:18.846673 kernel: audit: type=1334 audit(1734055457.969:90): prog-id=3 op=UNLOAD Dec 13 02:04:18.846689 kernel: audit: type=1334 audit(1734055457.975:91): prog-id=13 op=LOAD Dec 13 02:04:18.846702 kernel: audit: type=1334 audit(1734055457.982:92): prog-id=14 op=LOAD Dec 13 02:04:18.846716 kernel: audit: type=1334 audit(1734055457.982:93): prog-id=4 op=UNLOAD Dec 13 02:04:18.846730 kernel: audit: type=1334 audit(1734055457.982:94): prog-id=5 op=UNLOAD Dec 13 02:04:18.846744 kernel: audit: type=1334 audit(1734055457.989:95): prog-id=15 op=LOAD Dec 13 02:04:18.846757 kernel: audit: type=1334 audit(1734055457.989:96): prog-id=12 op=UNLOAD Dec 13 02:04:18.846771 kernel: audit: type=1334 audit(1734055458.016:97): prog-id=16 op=LOAD Dec 13 02:04:18.846785 kernel: audit: type=1334 audit(1734055458.023:98): prog-id=17 op=LOAD Dec 13 02:04:18.846903 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:04:18.846931 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:04:18.846947 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:04:18.846962 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:04:18.846977 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:04:18.846992 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:04:18.847007 systemd[1]: Created slice system-getty.slice. Dec 13 02:04:18.847025 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:04:18.847044 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:04:18.847059 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:04:18.847076 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:04:18.847091 systemd[1]: Created slice user.slice. Dec 13 02:04:18.847106 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:04:18.847121 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:04:18.847136 systemd[1]: Set up automount boot.automount. Dec 13 02:04:18.847151 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:04:18.847166 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:04:18.847184 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:04:18.847198 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:04:18.847213 systemd[1]: Reached target integritysetup.target. Dec 13 02:04:18.847228 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:04:18.847243 systemd[1]: Reached target remote-fs.target. Dec 13 02:04:18.847258 systemd[1]: Reached target slices.target. Dec 13 02:04:18.847272 systemd[1]: Reached target swap.target. Dec 13 02:04:18.847289 systemd[1]: Reached target torcx.target. Dec 13 02:04:18.847311 systemd[1]: Reached target veritysetup.target. Dec 13 02:04:18.847340 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:04:18.847361 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:04:18.847377 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:04:18.847392 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:04:18.847406 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:04:18.847420 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:04:18.847435 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:04:18.847449 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:04:18.847464 systemd[1]: Mounting media.mount... Dec 13 02:04:18.847479 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.847500 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:04:18.847514 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:04:18.847529 systemd[1]: Mounting tmp.mount... Dec 13 02:04:18.847543 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:04:18.847558 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:18.847573 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:04:18.847588 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:04:18.847602 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:18.847617 systemd[1]: Starting modprobe@drm.service... Dec 13 02:04:18.847634 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:18.847657 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:04:18.847681 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:18.847704 kernel: fuse: init (API version 7.34) Dec 13 02:04:18.847731 kernel: loop: module loaded Dec 13 02:04:18.847754 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:04:18.847778 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:04:18.847796 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:04:18.847844 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:04:18.847867 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:04:18.847882 systemd[1]: Stopped systemd-journald.service. Dec 13 02:04:18.847897 systemd[1]: Starting systemd-journald.service... Dec 13 02:04:18.847911 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:04:18.847925 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:04:18.847944 systemd-journald[990]: Journal started Dec 13 02:04:18.848010 systemd-journald[990]: Runtime Journal (/run/log/journal/b32af483ba7ee460e7d494dd3b174b2f) is 8.0M, max 148.8M, 140.8M free. Dec 13 02:04:14.208000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:04:14.510000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:04:14.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:04:14.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:04:14.668000 audit: BPF prog-id=10 op=LOAD Dec 13 02:04:14.668000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:04:14.668000 audit: BPF prog-id=11 op=LOAD Dec 13 02:04:14.668000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:04:14.839000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:04:14.839000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.839000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:04:14.850000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:04:14.850000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:14.850000 audit: CWD cwd="/" Dec 13 02:04:14.850000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:14.850000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:14.850000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:04:17.969000 audit: BPF prog-id=12 op=LOAD Dec 13 02:04:17.969000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:04:17.975000 audit: BPF prog-id=13 op=LOAD Dec 13 02:04:17.982000 audit: BPF prog-id=14 op=LOAD Dec 13 02:04:17.982000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:04:17.982000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:04:17.989000 audit: BPF prog-id=15 op=LOAD Dec 13 02:04:17.989000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:04:18.016000 audit: BPF prog-id=16 op=LOAD Dec 13 02:04:18.023000 audit: BPF prog-id=17 op=LOAD Dec 13 02:04:18.023000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:04:18.023000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:04:18.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.052000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:04:18.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.801000 audit: BPF prog-id=18 op=LOAD Dec 13 02:04:18.801000 audit: BPF prog-id=19 op=LOAD Dec 13 02:04:18.801000 audit: BPF prog-id=20 op=LOAD Dec 13 02:04:18.801000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:04:18.801000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:04:18.842000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:04:18.842000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe18d9a1a0 a2=4000 a3=7ffe18d9a23c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:18.842000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:04:17.969615 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:04:14.836531 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:18.027011 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:04:14.837945 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:04:14.837982 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:04:14.838035 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:04:14.838055 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:04:14.838108 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:04:14.838132 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:04:14.838447 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:04:14.838529 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:04:14.838555 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:04:14.840463 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:04:14.840520 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:04:14.840543 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:04:14.840561 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:04:14.840584 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:04:14.840600 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:04:17.342063 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:17.342491 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:17.342677 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:17.343042 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:04:17.343129 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:04:17.343239 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-12-13T02:04:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:04:18.859845 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:04:18.874841 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:04:18.894170 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:04:18.894268 systemd[1]: Stopped verity-setup.service. Dec 13 02:04:18.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.913986 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:18.922844 systemd[1]: Started systemd-journald.service. Dec 13 02:04:18.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.932203 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:04:18.939142 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:04:18.946080 systemd[1]: Mounted media.mount. Dec 13 02:04:18.953073 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:04:18.962092 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:04:18.971068 systemd[1]: Mounted tmp.mount. Dec 13 02:04:18.978166 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:04:18.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.987283 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:04:18.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:18.996274 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:04:18.996484 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:04:19.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.005342 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:19.005549 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:19.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.014331 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:04:19.014540 systemd[1]: Finished modprobe@drm.service. Dec 13 02:04:19.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.023328 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:19.023532 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:19.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.032309 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:04:19.032511 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:04:19.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.041358 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:19.041559 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:19.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.051324 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:04:19.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.060276 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:04:19.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.069288 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:04:19.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.078336 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:04:19.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.087661 systemd[1]: Reached target network-pre.target. Dec 13 02:04:19.097326 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:04:19.108347 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:04:19.114926 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:04:19.117698 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:04:19.126693 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:04:19.134968 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:19.136573 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:04:19.143980 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:19.145606 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:04:19.149029 systemd-journald[990]: Time spent on flushing to /var/log/journal/b32af483ba7ee460e7d494dd3b174b2f is 51.664ms for 1160 entries. Dec 13 02:04:19.149029 systemd-journald[990]: System Journal (/var/log/journal/b32af483ba7ee460e7d494dd3b174b2f) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:04:19.241865 systemd-journald[990]: Received client request to flush runtime journal. Dec 13 02:04:19.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.162778 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:04:19.172498 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:04:19.183365 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:04:19.244181 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:04:19.192077 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:04:19.201309 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:04:19.210339 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:04:19.222492 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:04:19.243168 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:04:19.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.252449 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:04:19.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.262865 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:04:19.319678 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:04:19.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.836633 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:04:19.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.845000 audit: BPF prog-id=21 op=LOAD Dec 13 02:04:19.845000 audit: BPF prog-id=22 op=LOAD Dec 13 02:04:19.845000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:04:19.845000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:04:19.847856 systemd[1]: Starting systemd-udevd.service... Dec 13 02:04:19.870389 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Dec 13 02:04:19.916862 systemd[1]: Started systemd-udevd.service. Dec 13 02:04:19.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:19.925000 audit: BPF prog-id=23 op=LOAD Dec 13 02:04:19.928207 systemd[1]: Starting systemd-networkd.service... Dec 13 02:04:19.942000 audit: BPF prog-id=24 op=LOAD Dec 13 02:04:19.942000 audit: BPF prog-id=25 op=LOAD Dec 13 02:04:19.942000 audit: BPF prog-id=26 op=LOAD Dec 13 02:04:19.945608 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:04:19.993500 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:04:20.014155 systemd[1]: Started systemd-userdbd.service. Dec 13 02:04:20.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.109837 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:04:20.163645 systemd-networkd[1023]: lo: Link UP Dec 13 02:04:20.163658 systemd-networkd[1023]: lo: Gained carrier Dec 13 02:04:20.164432 systemd-networkd[1023]: Enumeration completed Dec 13 02:04:20.164576 systemd[1]: Started systemd-networkd.service. Dec 13 02:04:20.165445 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:04:20.168459 systemd-networkd[1023]: eth0: Link UP Dec 13 02:04:20.168609 systemd-networkd[1023]: eth0: Gained carrier Dec 13 02:04:20.148000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:04:20.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.148000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5599eca26fa0 a1=337fc a2=7f6155baabc5 a3=5 items=110 ppid=1009 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:20.181033 systemd-networkd[1023]: eth0: DHCPv4 address 10.128.0.42/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 02:04:20.148000 audit: CWD cwd="/" Dec 13 02:04:20.148000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=1 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=2 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=3 name=(null) inode=14150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=4 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=5 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=6 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=7 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=8 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=9 name=(null) inode=14153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=10 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=11 name=(null) inode=14154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=12 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=13 name=(null) inode=14155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=14 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=15 name=(null) inode=14156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=16 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=17 name=(null) inode=14157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=18 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=19 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=20 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=21 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=22 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=23 name=(null) inode=14160 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=24 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=25 name=(null) inode=14161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=26 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=27 name=(null) inode=14162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=28 name=(null) inode=14158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=29 name=(null) inode=14163 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=30 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=31 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=32 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=33 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=34 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=35 name=(null) inode=14166 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=36 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=37 name=(null) inode=14167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=38 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=39 name=(null) inode=14168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=40 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=41 name=(null) inode=14169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=42 name=(null) inode=14149 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=43 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=44 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=45 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=46 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=47 name=(null) inode=14172 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=48 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=49 name=(null) inode=14173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=50 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=51 name=(null) inode=14174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=52 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=53 name=(null) inode=14175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=55 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=56 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=57 name=(null) inode=14177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=58 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=59 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=60 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=61 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=62 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=63 name=(null) inode=14180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=64 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=65 name=(null) inode=14181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=66 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=67 name=(null) inode=14182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=68 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=69 name=(null) inode=14183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=70 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=71 name=(null) inode=14184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=72 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=73 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=74 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=75 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=76 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=77 name=(null) inode=14187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=78 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=79 name=(null) inode=14188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=80 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=81 name=(null) inode=14189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=82 name=(null) inode=14185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=83 name=(null) inode=14190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=84 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=85 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=86 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=87 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=88 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=89 name=(null) inode=14193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=90 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=91 name=(null) inode=14194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=92 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=93 name=(null) inode=14195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=94 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=95 name=(null) inode=14196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=96 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=97 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=98 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=99 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=100 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=101 name=(null) inode=14199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=102 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=103 name=(null) inode=14200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=104 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=105 name=(null) inode=14201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=106 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=107 name=(null) inode=14202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PATH item=109 name=(null) inode=14204 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:04:20.148000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:04:20.234881 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:04:20.240831 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:04:20.253838 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 02:04:20.260124 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:04:20.268830 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:04:20.286834 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Dec 13 02:04:20.302855 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:04:20.341907 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1034) Dec 13 02:04:20.355783 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:04:20.364294 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:04:20.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.374579 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:04:20.402673 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:04:20.432192 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:04:20.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.441166 systemd[1]: Reached target cryptsetup.target. Dec 13 02:04:20.451453 systemd[1]: Starting lvm2-activation.service... Dec 13 02:04:20.457790 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:04:20.484173 systemd[1]: Finished lvm2-activation.service. Dec 13 02:04:20.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.493155 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:04:20.501972 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:04:20.502025 systemd[1]: Reached target local-fs.target. Dec 13 02:04:20.509958 systemd[1]: Reached target machines.target. Dec 13 02:04:20.519475 systemd[1]: Starting ldconfig.service... Dec 13 02:04:20.528010 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:20.528096 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:20.529713 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:04:20.538638 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:04:20.551734 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:04:20.554003 systemd[1]: Starting systemd-sysext.service... Dec 13 02:04:20.554922 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Dec 13 02:04:20.557301 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:04:20.576125 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:04:20.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.590106 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:04:20.599320 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:04:20.599579 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:04:20.623846 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 02:04:20.730364 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) Dec 13 02:04:20.730364 systemd-fsck[1060]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:04:20.735096 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:04:20.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.747845 systemd[1]: Mounting boot.mount... Dec 13 02:04:20.775474 systemd[1]: Mounted boot.mount. Dec 13 02:04:20.796997 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:04:20.802697 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:04:20.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.856871 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 02:04:20.884535 (sd-sysext)[1064]: Using extensions 'kubernetes'. Dec 13 02:04:20.885233 (sd-sysext)[1064]: Merged extensions into '/usr'. Dec 13 02:04:20.910497 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:20.913962 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:04:20.922205 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:20.924508 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:20.934639 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:20.943721 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:20.951028 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:20.951269 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:20.951471 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:20.955526 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:04:20.964434 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:20.964680 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:20.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.973667 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:20.973912 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:20.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.982603 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:20.983229 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:20.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:20.992913 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:20.993061 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:20.994886 systemd[1]: Finished systemd-sysext.service. Dec 13 02:04:21.006938 systemd[1]: Starting ensure-sysext.service... Dec 13 02:04:21.015649 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:04:21.031487 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:04:21.035240 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:04:21.039120 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:04:21.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.041190 systemd[1]: Reloading. Dec 13 02:04:21.042688 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:04:21.167635 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:04:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:21.171407 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:04:21Z" level=info msg="torcx already run" Dec 13 02:04:21.238048 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:04:21.359326 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:21.359352 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:21.385123 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:21.458744 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:04:21.460000 audit: BPF prog-id=27 op=LOAD Dec 13 02:04:21.460000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:04:21.461000 audit: BPF prog-id=28 op=LOAD Dec 13 02:04:21.461000 audit: BPF prog-id=29 op=LOAD Dec 13 02:04:21.461000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:04:21.461000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:04:21.465000 audit: BPF prog-id=30 op=LOAD Dec 13 02:04:21.465000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:04:21.465000 audit: BPF prog-id=31 op=LOAD Dec 13 02:04:21.465000 audit: BPF prog-id=32 op=LOAD Dec 13 02:04:21.465000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:04:21.465000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:04:21.466000 audit: BPF prog-id=33 op=LOAD Dec 13 02:04:21.466000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:04:21.466000 audit: BPF prog-id=34 op=LOAD Dec 13 02:04:21.466000 audit: BPF prog-id=35 op=LOAD Dec 13 02:04:21.466000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:04:21.466000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:04:21.472301 systemd[1]: Finished ldconfig.service. Dec 13 02:04:21.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.480724 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:04:21.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.495323 systemd[1]: Starting audit-rules.service... Dec 13 02:04:21.504486 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:04:21.514889 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:21.525043 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:04:21.534000 audit: BPF prog-id=36 op=LOAD Dec 13 02:04:21.537756 systemd[1]: Starting systemd-resolved.service... Dec 13 02:04:21.545000 audit: BPF prog-id=37 op=LOAD Dec 13 02:04:21.549065 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:04:21.558515 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:04:21.569001 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:04:21.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.578914 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:21.579199 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:21.578000 audit[1159]: SYSTEM_BOOT pid=1159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:21.591267 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:04:21.591000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:04:21.591000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff35f8c1f0 a2=420 a3=0 items=0 ppid=1135 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:21.591000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:04:21.593620 augenrules[1165]: No rules Dec 13 02:04:21.604246 systemd[1]: Finished audit-rules.service. Dec 13 02:04:21.616191 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.616736 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.619465 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:21.630310 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:21.641194 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:21.651022 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:21.660061 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.660461 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:21.660893 enable-oslogin[1173]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:21.663888 systemd[1]: Starting systemd-update-done.service... Dec 13 02:04:21.670978 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:21.671338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.675357 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:21.675633 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:21.684955 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:21.685178 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:21.695148 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:21.695381 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:21.705010 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:21.705285 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:21.715178 systemd[1]: Finished systemd-update-done.service. Dec 13 02:04:21.725303 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:21.725657 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.729866 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:04:21.740788 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.741331 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.743929 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:21.753029 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:21.757654 systemd-timesyncd[1155]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 02:04:21.757676 systemd-resolved[1153]: Positive Trust Anchors: Dec 13 02:04:21.757689 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:04:21.757745 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:04:21.758647 systemd-timesyncd[1155]: Initial clock synchronization to Fri 2024-12-13 02:04:22.045290 UTC. Dec 13 02:04:21.761583 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:21.770583 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:21.776466 enable-oslogin[1179]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:21.779006 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.779255 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:21.779479 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:21.779638 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.781534 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:04:21.791604 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:21.791856 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:21.798054 systemd-resolved[1153]: Defaulting to hostname 'linux'. Dec 13 02:04:21.800430 systemd[1]: Started systemd-resolved.service. Dec 13 02:04:21.809556 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:21.809846 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:21.818515 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:21.818718 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:21.828466 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:21.828714 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:21.841216 systemd[1]: Reached target network.target. Dec 13 02:04:21.850118 systemd[1]: Reached target nss-lookup.target. Dec 13 02:04:21.859107 systemd[1]: Reached target time-set.target. Dec 13 02:04:21.868082 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.868564 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.870668 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:04:21.879844 systemd[1]: Starting modprobe@drm.service... Dec 13 02:04:21.888641 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:04:21.897853 systemd[1]: Starting modprobe@loop.service... Dec 13 02:04:21.906864 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 02:04:21.910841 enable-oslogin[1184]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 02:04:21.915025 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:04:21.915271 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:21.917093 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:04:21.925959 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:04:21.926182 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:04:21.928926 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:04:21.929141 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:04:21.938492 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:04:21.938715 systemd[1]: Finished modprobe@drm.service. Dec 13 02:04:21.947451 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:04:21.947676 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:04:21.956470 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:04:21.956699 systemd[1]: Finished modprobe@loop.service. Dec 13 02:04:21.965429 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 02:04:21.965678 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 02:04:21.974754 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:04:21.974996 systemd[1]: Reached target sysinit.target. Dec 13 02:04:21.984029 systemd[1]: Started motdgen.path. Dec 13 02:04:21.990965 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:04:22.001119 systemd[1]: Started logrotate.timer. Dec 13 02:04:22.008127 systemd[1]: Started mdadm.timer. Dec 13 02:04:22.015012 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:04:22.024039 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:04:22.024091 systemd[1]: Reached target paths.target. Dec 13 02:04:22.030992 systemd[1]: Reached target timers.target. Dec 13 02:04:22.038605 systemd[1]: Listening on dbus.socket. Dec 13 02:04:22.043975 systemd-networkd[1023]: eth0: Gained IPv6LL Dec 13 02:04:22.047378 systemd[1]: Starting docker.socket... Dec 13 02:04:22.059219 systemd[1]: Listening on sshd.socket. Dec 13 02:04:22.066123 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:22.066213 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:04:22.067223 systemd[1]: Finished ensure-sysext.service. Dec 13 02:04:22.076434 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:04:22.086181 systemd[1]: Listening on docker.socket. Dec 13 02:04:22.094202 systemd[1]: Reached target network-online.target. Dec 13 02:04:22.102962 systemd[1]: Reached target sockets.target. Dec 13 02:04:22.112004 systemd[1]: Reached target basic.target. Dec 13 02:04:22.119062 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:04:22.119108 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:04:22.120730 systemd[1]: Starting containerd.service... Dec 13 02:04:22.129414 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:04:22.139501 systemd[1]: Starting dbus.service... Dec 13 02:04:22.147720 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:04:22.156795 systemd[1]: Starting extend-filesystems.service... Dec 13 02:04:22.169787 jq[1191]: false Dec 13 02:04:22.165008 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:04:22.170227 systemd[1]: Starting kubelet.service... Dec 13 02:04:22.179170 systemd[1]: Starting motdgen.service... Dec 13 02:04:22.187656 systemd[1]: Starting oem-gce.service... Dec 13 02:04:22.199579 systemd[1]: Starting prepare-helm.service... Dec 13 02:04:22.204374 extend-filesystems[1192]: Found loop1 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda1 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda2 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda3 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found usr Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda4 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda6 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda7 Dec 13 02:04:22.216067 extend-filesystems[1192]: Found sda9 Dec 13 02:04:22.216067 extend-filesystems[1192]: Checking size of /dev/sda9 Dec 13 02:04:22.209684 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:04:22.324881 extend-filesystems[1192]: Resized partition /dev/sda9 Dec 13 02:04:22.225108 systemd[1]: Starting sshd-keygen.service... Dec 13 02:04:22.241861 systemd[1]: Starting systemd-logind.service... Dec 13 02:04:22.335075 extend-filesystems[1220]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:04:22.249222 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:04:22.249332 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 02:04:22.250165 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:04:22.345139 jq[1221]: true Dec 13 02:04:22.251561 systemd[1]: Starting update-engine.service... Dec 13 02:04:22.272786 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:04:22.278073 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:04:22.278532 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:04:22.287829 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:04:22.288163 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:04:22.346600 mkfs.ext4[1228]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 02:04:22.346600 mkfs.ext4[1228]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 02:04:22.346600 mkfs.ext4[1228]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 02:04:22.346600 mkfs.ext4[1228]: Filesystem UUID: b3fe9075-e800-4718-9f31-a7433bf34e9c Dec 13 02:04:22.346600 mkfs.ext4[1228]: Superblock backups stored on blocks: Dec 13 02:04:22.346600 mkfs.ext4[1228]: 32768, 98304, 163840, 229376 Dec 13 02:04:22.346600 mkfs.ext4[1228]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:22.346600 mkfs.ext4[1228]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:22.346600 mkfs.ext4[1228]: Creating journal (8192 blocks): done Dec 13 02:04:22.346600 mkfs.ext4[1228]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 02:04:22.349013 systemd[1]: Created slice system-sshd.slice. Dec 13 02:04:22.360983 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 02:04:22.365602 dbus-daemon[1190]: [system] SELinux support is enabled Dec 13 02:04:22.366269 systemd[1]: Started dbus.service. Dec 13 02:04:22.380902 dbus-daemon[1190]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1023 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:04:22.387827 jq[1230]: true Dec 13 02:04:22.393032 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:04:22.393336 systemd[1]: Finished motdgen.service. Dec 13 02:04:22.406603 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:04:22.406687 systemd[1]: Reached target system-config.target. Dec 13 02:04:22.408209 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:04:22.418858 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 02:04:22.422220 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:04:22.422265 systemd[1]: Reached target user-config.target. Dec 13 02:04:22.441356 umount[1239]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 02:04:22.441618 tar[1225]: linux-amd64/helm Dec 13 02:04:22.440639 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:04:22.443258 extend-filesystems[1220]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 02:04:22.443258 extend-filesystems[1220]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 02:04:22.443258 extend-filesystems[1220]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 02:04:22.495071 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:04:22.449691 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:04:22.495401 env[1227]: time="2024-12-13T02:04:22.465809056Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:04:22.495706 extend-filesystems[1192]: Resized filesystem in /dev/sda9 Dec 13 02:04:22.510620 update_engine[1217]: I1213 02:04:22.480026 1217 main.cc:92] Flatcar Update Engine starting Dec 13 02:04:22.510620 update_engine[1217]: I1213 02:04:22.500849 1217 update_check_scheduler.cc:74] Next update check in 2m50s Dec 13 02:04:22.450004 systemd[1]: Finished extend-filesystems.service. Dec 13 02:04:22.501025 systemd[1]: Started update-engine.service. Dec 13 02:04:22.524802 systemd[1]: Started locksmithd.service. Dec 13 02:04:22.564600 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:04:22.695155 env[1227]: time="2024-12-13T02:04:22.695090211Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:04:22.695331 env[1227]: time="2024-12-13T02:04:22.695299451Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.697981 env[1227]: time="2024-12-13T02:04:22.697930833Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:22.697981 env[1227]: time="2024-12-13T02:04:22.697980499Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.698351 env[1227]: time="2024-12-13T02:04:22.698311912Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:22.698441 env[1227]: time="2024-12-13T02:04:22.698351959Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.698441 env[1227]: time="2024-12-13T02:04:22.698374784Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:04:22.698441 env[1227]: time="2024-12-13T02:04:22.698393940Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.698579 env[1227]: time="2024-12-13T02:04:22.698528579Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.698986 env[1227]: time="2024-12-13T02:04:22.698951362Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:04:22.699232 env[1227]: time="2024-12-13T02:04:22.699194098Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:04:22.699310 env[1227]: time="2024-12-13T02:04:22.699232733Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:04:22.699365 env[1227]: time="2024-12-13T02:04:22.699314892Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:04:22.699365 env[1227]: time="2024-12-13T02:04:22.699336065Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:04:22.719004 bash[1265]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:04:22.720127 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:04:22.724888 env[1227]: time="2024-12-13T02:04:22.724757800Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:04:22.725007 env[1227]: time="2024-12-13T02:04:22.724925375Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:04:22.725007 env[1227]: time="2024-12-13T02:04:22.724952750Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:04:22.725112 env[1227]: time="2024-12-13T02:04:22.725022769Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725112 env[1227]: time="2024-12-13T02:04:22.725052367Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725206 env[1227]: time="2024-12-13T02:04:22.725107855Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725206 env[1227]: time="2024-12-13T02:04:22.725135043Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725311 env[1227]: time="2024-12-13T02:04:22.725250350Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725311 env[1227]: time="2024-12-13T02:04:22.725276552Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725311 env[1227]: time="2024-12-13T02:04:22.725300642Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725449 env[1227]: time="2024-12-13T02:04:22.725342629Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.725449 env[1227]: time="2024-12-13T02:04:22.725368080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:04:22.725591 env[1227]: time="2024-12-13T02:04:22.725558110Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:04:22.725802 env[1227]: time="2024-12-13T02:04:22.725770571Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:04:22.726505 env[1227]: time="2024-12-13T02:04:22.726470535Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:04:22.726617 env[1227]: time="2024-12-13T02:04:22.726551947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.726617 env[1227]: time="2024-12-13T02:04:22.726582015Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:04:22.726720 env[1227]: time="2024-12-13T02:04:22.726705327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.726859 env[1227]: time="2024-12-13T02:04:22.726731704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.726933 env[1227]: time="2024-12-13T02:04:22.726874211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.726933 env[1227]: time="2024-12-13T02:04:22.726921734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727046 env[1227]: time="2024-12-13T02:04:22.726947516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727046 env[1227]: time="2024-12-13T02:04:22.726970317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727046 env[1227]: time="2024-12-13T02:04:22.727011703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727046 env[1227]: time="2024-12-13T02:04:22.727035537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727249 env[1227]: time="2024-12-13T02:04:22.727060824Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:04:22.727338 env[1227]: time="2024-12-13T02:04:22.727307580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727408 env[1227]: time="2024-12-13T02:04:22.727359764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727408 env[1227]: time="2024-12-13T02:04:22.727383860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.727595 env[1227]: time="2024-12-13T02:04:22.727404857Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:04:22.727595 env[1227]: time="2024-12-13T02:04:22.727450736Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:04:22.727595 env[1227]: time="2024-12-13T02:04:22.727473741Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:04:22.727595 env[1227]: time="2024-12-13T02:04:22.727550793Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:04:22.727801 env[1227]: time="2024-12-13T02:04:22.727626892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:04:22.749879 env[1227]: time="2024-12-13T02:04:22.728067160Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:04:22.749879 env[1227]: time="2024-12-13T02:04:22.748692787Z" level=info msg="Connect containerd service" Dec 13 02:04:22.749879 env[1227]: time="2024-12-13T02:04:22.748821275Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:04:22.749879 env[1227]: time="2024-12-13T02:04:22.749696609Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:04:22.754492 env[1227]: time="2024-12-13T02:04:22.750348725Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:04:22.754492 env[1227]: time="2024-12-13T02:04:22.750424941Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:04:22.754492 env[1227]: time="2024-12-13T02:04:22.750515094Z" level=info msg="containerd successfully booted in 0.293528s" Dec 13 02:04:22.752353 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:04:22.750573 systemd[1]: Started containerd.service. Dec 13 02:04:22.753012 dbus-daemon[1190]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1240 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:04:22.758151 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:04:22.758643 env[1227]: time="2024-12-13T02:04:22.758587474Z" level=info msg="Start subscribing containerd event" Dec 13 02:04:22.758803 env[1227]: time="2024-12-13T02:04:22.758779747Z" level=info msg="Start recovering state" Dec 13 02:04:22.759073 env[1227]: time="2024-12-13T02:04:22.759048998Z" level=info msg="Start event monitor" Dec 13 02:04:22.759199 env[1227]: time="2024-12-13T02:04:22.759178594Z" level=info msg="Start snapshots syncer" Dec 13 02:04:22.760916 env[1227]: time="2024-12-13T02:04:22.760884051Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:04:22.761043 env[1227]: time="2024-12-13T02:04:22.761021855Z" level=info msg="Start streaming server" Dec 13 02:04:22.767807 systemd-logind[1214]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:04:22.767882 systemd-logind[1214]: Watching system buttons on /dev/input/event3 (Sleep Button) Dec 13 02:04:22.767918 systemd-logind[1214]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:04:22.770956 systemd[1]: Starting polkit.service... Dec 13 02:04:22.773002 systemd-logind[1214]: New seat seat0. Dec 13 02:04:22.781354 systemd[1]: Started systemd-logind.service. Dec 13 02:04:22.916334 coreos-metadata[1189]: Dec 13 02:04:22.916 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 02:04:22.936463 coreos-metadata[1189]: Dec 13 02:04:22.936 INFO Fetch failed with 404: resource not found Dec 13 02:04:22.936831 coreos-metadata[1189]: Dec 13 02:04:22.936 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 02:04:22.938510 coreos-metadata[1189]: Dec 13 02:04:22.938 INFO Fetch successful Dec 13 02:04:22.938757 coreos-metadata[1189]: Dec 13 02:04:22.938 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 02:04:22.941266 coreos-metadata[1189]: Dec 13 02:04:22.941 INFO Fetch failed with 404: resource not found Dec 13 02:04:22.941567 coreos-metadata[1189]: Dec 13 02:04:22.941 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 02:04:22.944336 coreos-metadata[1189]: Dec 13 02:04:22.944 INFO Fetch failed with 404: resource not found Dec 13 02:04:22.944599 coreos-metadata[1189]: Dec 13 02:04:22.944 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 02:04:22.947581 coreos-metadata[1189]: Dec 13 02:04:22.947 INFO Fetch successful Dec 13 02:04:22.952063 unknown[1189]: wrote ssh authorized keys file for user: core Dec 13 02:04:22.977307 polkitd[1268]: Started polkitd version 121 Dec 13 02:04:22.993861 update-ssh-keys[1269]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:04:22.994984 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:04:23.062073 polkitd[1268]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:04:23.062219 polkitd[1268]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:04:23.074540 polkitd[1268]: Finished loading, compiling and executing 2 rules Dec 13 02:04:23.075645 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:04:23.075978 systemd[1]: Started polkit.service. Dec 13 02:04:23.077346 polkitd[1268]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:04:23.141177 systemd-hostnamed[1240]: Hostname set to (transient) Dec 13 02:04:23.145718 systemd-resolved[1153]: System hostname changed to 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal'. Dec 13 02:04:24.088586 tar[1225]: linux-amd64/LICENSE Dec 13 02:04:24.089220 tar[1225]: linux-amd64/README.md Dec 13 02:04:24.105211 systemd[1]: Finished prepare-helm.service. Dec 13 02:04:24.339377 sshd_keygen[1218]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:04:24.448390 systemd[1]: Finished sshd-keygen.service. Dec 13 02:04:24.459590 systemd[1]: Starting issuegen.service... Dec 13 02:04:24.470161 systemd[1]: Started sshd@0-10.128.0.42:22-139.178.68.195:34442.service. Dec 13 02:04:24.482158 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:04:24.482424 systemd[1]: Finished issuegen.service. Dec 13 02:04:24.494253 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:04:24.509274 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:04:24.519299 systemd[1]: Started getty@tty1.service. Dec 13 02:04:24.529924 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:04:24.539688 systemd[1]: Reached target getty.target. Dec 13 02:04:24.668364 systemd[1]: Started kubelet.service. Dec 13 02:04:24.767016 locksmithd[1248]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:04:24.884698 sshd[1291]: Accepted publickey for core from 139.178.68.195 port 34442 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:24.889721 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:24.910113 systemd[1]: Created slice user-500.slice. Dec 13 02:04:24.919165 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:04:24.931552 systemd-logind[1214]: New session 1 of user core. Dec 13 02:04:24.941868 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:04:24.954900 systemd[1]: Starting user@500.service... Dec 13 02:04:24.983069 (systemd)[1300]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:25.181342 systemd[1300]: Queued start job for default target default.target. Dec 13 02:04:25.182237 systemd[1300]: Reached target paths.target. Dec 13 02:04:25.182269 systemd[1300]: Reached target sockets.target. Dec 13 02:04:25.182294 systemd[1300]: Reached target timers.target. Dec 13 02:04:25.182317 systemd[1300]: Reached target basic.target. Dec 13 02:04:25.182486 systemd[1]: Started user@500.service. Dec 13 02:04:25.182648 systemd[1300]: Reached target default.target. Dec 13 02:04:25.182730 systemd[1300]: Startup finished in 186ms. Dec 13 02:04:25.193298 systemd[1]: Started session-1.scope. Dec 13 02:04:25.432971 systemd[1]: Started sshd@1-10.128.0.42:22-139.178.68.195:34452.service. Dec 13 02:04:25.794742 sshd[1314]: Accepted publickey for core from 139.178.68.195 port 34452 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:25.795719 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:25.806742 systemd[1]: Started session-2.scope. Dec 13 02:04:25.808124 systemd-logind[1214]: New session 2 of user core. Dec 13 02:04:26.015681 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:26.022000 systemd[1]: sshd@1-10.128.0.42:22-139.178.68.195:34452.service: Deactivated successfully. Dec 13 02:04:26.023195 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:04:26.025560 systemd-logind[1214]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:04:26.027648 systemd-logind[1214]: Removed session 2. Dec 13 02:04:26.063094 systemd[1]: Started sshd@2-10.128.0.42:22-139.178.68.195:46830.service. Dec 13 02:04:26.149031 kubelet[1298]: E1213 02:04:26.148921 1298 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:26.151955 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:26.152177 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:26.152574 systemd[1]: kubelet.service: Consumed 1.459s CPU time. Dec 13 02:04:26.373850 sshd[1320]: Accepted publickey for core from 139.178.68.195 port 46830 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:26.376290 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:26.383907 systemd[1]: Started session-3.scope. Dec 13 02:04:26.385668 systemd-logind[1214]: New session 3 of user core. Dec 13 02:04:26.597071 sshd[1320]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:26.601401 systemd[1]: sshd@2-10.128.0.42:22-139.178.68.195:46830.service: Deactivated successfully. Dec 13 02:04:26.602497 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:04:26.604899 systemd-logind[1214]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:04:26.606690 systemd-logind[1214]: Removed session 3. Dec 13 02:04:28.413281 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 02:04:30.520848 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 02:04:30.547650 systemd-nspawn[1326]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 02:04:30.547650 systemd-nspawn[1326]: Press ^] three times within 1s to kill container. Dec 13 02:04:30.562860 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:04:30.585194 systemd[1]: tmp-unifiedNpo6Gw.mount: Deactivated successfully. Dec 13 02:04:30.650394 systemd[1]: Started oem-gce.service. Dec 13 02:04:30.650920 systemd[1]: Reached target multi-user.target. Dec 13 02:04:30.654172 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:04:30.664445 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:04:30.664626 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:04:30.665284 systemd[1]: Startup finished in 1.021s (kernel) + 7.585s (initrd) + 16.280s (userspace) = 24.887s. Dec 13 02:04:30.715525 systemd-nspawn[1326]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 02:04:30.715525 systemd-nspawn[1326]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 02:04:30.715783 systemd-nspawn[1326]: + /usr/bin/google_instance_setup Dec 13 02:04:31.318720 instance-setup[1332]: INFO Running google_set_multiqueue. Dec 13 02:04:31.337002 instance-setup[1332]: INFO Set channels for eth0 to 2. Dec 13 02:04:31.340895 instance-setup[1332]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 02:04:31.342244 instance-setup[1332]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 02:04:31.342686 instance-setup[1332]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 02:04:31.344200 instance-setup[1332]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 02:04:31.344549 instance-setup[1332]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 02:04:31.346092 instance-setup[1332]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 02:04:31.346520 instance-setup[1332]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 02:04:31.348007 instance-setup[1332]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 02:04:31.359722 instance-setup[1332]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 02:04:31.360127 instance-setup[1332]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 02:04:31.400278 systemd-nspawn[1326]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 02:04:31.734276 startup-script[1363]: INFO Starting startup scripts. Dec 13 02:04:31.748446 startup-script[1363]: INFO No startup scripts found in metadata. Dec 13 02:04:31.748609 startup-script[1363]: INFO Finished running startup scripts. Dec 13 02:04:31.780665 systemd-nspawn[1326]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 02:04:31.780665 systemd-nspawn[1326]: + daemon_pids=() Dec 13 02:04:31.780665 systemd-nspawn[1326]: + for d in accounts clock_skew network Dec 13 02:04:31.781419 systemd-nspawn[1326]: + daemon_pids+=($!) Dec 13 02:04:31.781419 systemd-nspawn[1326]: + for d in accounts clock_skew network Dec 13 02:04:31.781419 systemd-nspawn[1326]: + daemon_pids+=($!) Dec 13 02:04:31.781570 systemd-nspawn[1326]: + for d in accounts clock_skew network Dec 13 02:04:31.781885 systemd-nspawn[1326]: + daemon_pids+=($!) Dec 13 02:04:31.782029 systemd-nspawn[1326]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 02:04:31.782107 systemd-nspawn[1326]: + /usr/bin/systemd-notify --ready Dec 13 02:04:31.782254 systemd-nspawn[1326]: + /usr/bin/google_accounts_daemon Dec 13 02:04:31.782853 systemd-nspawn[1326]: + /usr/bin/google_network_daemon Dec 13 02:04:31.783175 systemd-nspawn[1326]: + /usr/bin/google_clock_skew_daemon Dec 13 02:04:31.843415 systemd-nspawn[1326]: + wait -n 36 37 38 Dec 13 02:04:32.430385 groupadd[1376]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 02:04:32.434350 groupadd[1376]: group added to /etc/gshadow: name=google-sudoers Dec 13 02:04:32.464538 groupadd[1376]: new group: name=google-sudoers, GID=1000 Dec 13 02:04:32.469088 google-clock-skew[1367]: INFO Starting Google Clock Skew daemon. Dec 13 02:04:32.486242 google-clock-skew[1367]: INFO Clock drift token has changed: 0. Dec 13 02:04:32.491071 systemd-nspawn[1326]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 02:04:32.491071 systemd-nspawn[1326]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 02:04:32.492276 google-clock-skew[1367]: WARNING Failed to sync system time with hardware clock. Dec 13 02:04:32.499116 google-accounts[1366]: INFO Starting Google Accounts daemon. Dec 13 02:04:32.514687 google-networking[1368]: INFO Starting Google Networking daemon. Dec 13 02:04:32.531326 google-accounts[1366]: WARNING OS Login not installed. Dec 13 02:04:32.532786 google-accounts[1366]: INFO Creating a new user account for 0. Dec 13 02:04:32.539694 systemd-nspawn[1326]: useradd: invalid user name '0': use --badname to ignore Dec 13 02:04:32.540388 google-accounts[1366]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 02:04:36.232366 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:04:36.232700 systemd[1]: Stopped kubelet.service. Dec 13 02:04:36.232769 systemd[1]: kubelet.service: Consumed 1.459s CPU time. Dec 13 02:04:36.234856 systemd[1]: Starting kubelet.service... Dec 13 02:04:36.435866 systemd[1]: Started kubelet.service. Dec 13 02:04:36.504380 kubelet[1392]: E1213 02:04:36.504209 1392 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:36.509345 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:36.509561 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:36.755619 systemd[1]: Started sshd@3-10.128.0.42:22-139.178.68.195:58856.service. Dec 13 02:04:37.045604 sshd[1399]: Accepted publickey for core from 139.178.68.195 port 58856 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:37.049827 sshd[1399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:37.056866 systemd-logind[1214]: New session 4 of user core. Dec 13 02:04:37.057649 systemd[1]: Started session-4.scope. Dec 13 02:04:37.260348 sshd[1399]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:37.264353 systemd[1]: sshd@3-10.128.0.42:22-139.178.68.195:58856.service: Deactivated successfully. Dec 13 02:04:37.265460 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:04:37.266331 systemd-logind[1214]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:04:37.267560 systemd-logind[1214]: Removed session 4. Dec 13 02:04:37.306091 systemd[1]: Started sshd@4-10.128.0.42:22-139.178.68.195:58870.service. Dec 13 02:04:37.592854 sshd[1405]: Accepted publickey for core from 139.178.68.195 port 58870 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:37.594875 sshd[1405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:37.601028 systemd-logind[1214]: New session 5 of user core. Dec 13 02:04:37.601722 systemd[1]: Started session-5.scope. Dec 13 02:04:37.802085 sshd[1405]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:37.806177 systemd[1]: sshd@4-10.128.0.42:22-139.178.68.195:58870.service: Deactivated successfully. Dec 13 02:04:37.807236 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:04:37.808108 systemd-logind[1214]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:04:37.809323 systemd-logind[1214]: Removed session 5. Dec 13 02:04:37.848009 systemd[1]: Started sshd@5-10.128.0.42:22-139.178.68.195:58878.service. Dec 13 02:04:38.137297 sshd[1411]: Accepted publickey for core from 139.178.68.195 port 58878 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:38.139173 sshd[1411]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:38.146450 systemd[1]: Started session-6.scope. Dec 13 02:04:38.147324 systemd-logind[1214]: New session 6 of user core. Dec 13 02:04:38.351873 sshd[1411]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:38.355745 systemd[1]: sshd@5-10.128.0.42:22-139.178.68.195:58878.service: Deactivated successfully. Dec 13 02:04:38.356818 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:04:38.357629 systemd-logind[1214]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:04:38.358862 systemd-logind[1214]: Removed session 6. Dec 13 02:04:38.397860 systemd[1]: Started sshd@6-10.128.0.42:22-139.178.68.195:58890.service. Dec 13 02:04:38.682771 sshd[1417]: Accepted publickey for core from 139.178.68.195 port 58890 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:38.684431 sshd[1417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:38.691097 systemd[1]: Started session-7.scope. Dec 13 02:04:38.691903 systemd-logind[1214]: New session 7 of user core. Dec 13 02:04:38.883831 sudo[1420]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:04:38.884294 sudo[1420]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:38.894071 dbus-daemon[1190]: \xd0M\xf0\xad!V: received setenforce notice (enforcing=1688217824) Dec 13 02:04:38.896280 sudo[1420]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:38.940058 sshd[1417]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:38.945276 systemd-logind[1214]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:04:38.945605 systemd[1]: sshd@6-10.128.0.42:22-139.178.68.195:58890.service: Deactivated successfully. Dec 13 02:04:38.946720 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:04:38.947794 systemd-logind[1214]: Removed session 7. Dec 13 02:04:38.986521 systemd[1]: Started sshd@7-10.128.0.42:22-139.178.68.195:58906.service. Dec 13 02:04:39.274353 sshd[1424]: Accepted publickey for core from 139.178.68.195 port 58906 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:39.276471 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:39.283212 systemd[1]: Started session-8.scope. Dec 13 02:04:39.283998 systemd-logind[1214]: New session 8 of user core. Dec 13 02:04:39.453314 sudo[1428]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:04:39.453728 sudo[1428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:39.457949 sudo[1428]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:39.470105 sudo[1427]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:04:39.470508 sudo[1427]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:39.482749 systemd[1]: Stopping audit-rules.service... Dec 13 02:04:39.505349 kernel: kauditd_printk_skb: 212 callbacks suppressed Dec 13 02:04:39.505499 kernel: audit: type=1305 audit(1734055479.483:194): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:04:39.483000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:04:39.485297 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:04:39.505867 auditctl[1431]: No rules Dec 13 02:04:39.485531 systemd[1]: Stopped audit-rules.service. Dec 13 02:04:39.490927 systemd[1]: Starting audit-rules.service... Dec 13 02:04:39.483000 audit[1431]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff096d0b70 a2=420 a3=0 items=0 ppid=1 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:39.524928 systemd[1]: Finished audit-rules.service. Dec 13 02:04:39.537946 kernel: audit: type=1300 audit(1734055479.483:194): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff096d0b70 a2=420 a3=0 items=0 ppid=1 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:39.538000 augenrules[1448]: No rules Dec 13 02:04:39.483000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:04:39.543079 sudo[1427]: pam_unix(sudo:session): session closed for user root Dec 13 02:04:39.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.570111 kernel: audit: type=1327 audit(1734055479.483:194): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:04:39.570236 kernel: audit: type=1131 audit(1734055479.484:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.570287 kernel: audit: type=1130 audit(1734055479.524:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.588102 sshd[1424]: pam_unix(sshd:session): session closed for user core Dec 13 02:04:39.541000 audit[1427]: USER_END pid=1427 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.593938 systemd-logind[1214]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:04:39.596305 systemd[1]: sshd@7-10.128.0.42:22-139.178.68.195:58906.service: Deactivated successfully. Dec 13 02:04:39.597367 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:04:39.599483 systemd-logind[1214]: Removed session 8. Dec 13 02:04:39.617336 kernel: audit: type=1106 audit(1734055479.541:197): pid=1427 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.617471 kernel: audit: type=1104 audit(1734055479.541:198): pid=1427 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.541000 audit[1427]: CRED_DISP pid=1427 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.638984 systemd[1]: Started sshd@8-10.128.0.42:22-139.178.68.195:58910.service. Dec 13 02:04:39.588000 audit[1424]: USER_END pid=1424 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.589000 audit[1424]: CRED_DISP pid=1424 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.673852 kernel: audit: type=1106 audit(1734055479.588:199): pid=1424 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.673923 kernel: audit: type=1104 audit(1734055479.589:200): pid=1424 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.42:22-139.178.68.195:58906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.698849 kernel: audit: type=1131 audit(1734055479.595:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.42:22-139.178.68.195:58906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.42:22-139.178.68.195:58910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:39.932000 audit[1454]: USER_ACCT pid=1454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.933649 sshd[1454]: Accepted publickey for core from 139.178.68.195 port 58910 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:04:39.934000 audit[1454]: CRED_ACQ pid=1454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.934000 audit[1454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4cca1f50 a2=3 a3=0 items=0 ppid=1 pid=1454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:39.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:04:39.936320 sshd[1454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:04:39.943343 systemd[1]: Started session-9.scope. Dec 13 02:04:39.944195 systemd-logind[1214]: New session 9 of user core. Dec 13 02:04:39.950000 audit[1454]: USER_START pid=1454 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:39.953000 audit[1456]: CRED_ACQ pid=1456 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:04:40.109000 audit[1457]: USER_ACCT pid=1457 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:40.111971 sudo[1457]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:04:40.110000 audit[1457]: CRED_REFR pid=1457 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:40.112525 sudo[1457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:04:40.113000 audit[1457]: USER_START pid=1457 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:04:40.148497 systemd[1]: Starting docker.service... Dec 13 02:04:40.198129 env[1467]: time="2024-12-13T02:04:40.197968908Z" level=info msg="Starting up" Dec 13 02:04:40.201590 env[1467]: time="2024-12-13T02:04:40.201552753Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:04:40.201781 env[1467]: time="2024-12-13T02:04:40.201761588Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:04:40.201934 env[1467]: time="2024-12-13T02:04:40.201913312Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:04:40.202021 env[1467]: time="2024-12-13T02:04:40.202006180Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:04:40.204457 env[1467]: time="2024-12-13T02:04:40.204432168Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:04:40.204579 env[1467]: time="2024-12-13T02:04:40.204560608Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:04:40.204664 env[1467]: time="2024-12-13T02:04:40.204648598Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:04:40.204724 env[1467]: time="2024-12-13T02:04:40.204711407Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:04:40.215266 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2993407446-merged.mount: Deactivated successfully. Dec 13 02:04:40.260319 env[1467]: time="2024-12-13T02:04:40.260266066Z" level=info msg="Loading containers: start." Dec 13 02:04:40.352000 audit[1498]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.352000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc96a19300 a2=0 a3=7ffc96a192ec items=0 ppid=1467 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:04:40.355000 audit[1500]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.355000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffc976b2a0 a2=0 a3=7fffc976b28c items=0 ppid=1467 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:04:40.357000 audit[1502]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.357000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff433ab4c0 a2=0 a3=7fff433ab4ac items=0 ppid=1467 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:04:40.360000 audit[1504]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.360000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe90ed6dc0 a2=0 a3=7ffe90ed6dac items=0 ppid=1467 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:04:40.364000 audit[1506]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.364000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd029556d0 a2=0 a3=7ffd029556bc items=0 ppid=1467 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:04:40.387000 audit[1511]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1511 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.387000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd889277f0 a2=0 a3=7ffd889277dc items=0 ppid=1467 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:04:40.398000 audit[1513]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.398000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdc87ec280 a2=0 a3=7ffdc87ec26c items=0 ppid=1467 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:04:40.401000 audit[1515]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1515 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.401000 audit[1515]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffedda4ec00 a2=0 a3=7ffedda4ebec items=0 ppid=1467 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:04:40.402000 audit[1517]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1517 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.402000 audit[1517]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd85441280 a2=0 a3=7ffd8544126c items=0 ppid=1467 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.402000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:40.416000 audit[1521]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.416000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe5aa57650 a2=0 a3=7ffe5aa5763c items=0 ppid=1467 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:40.421000 audit[1522]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.421000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdef1027e0 a2=0 a3=7ffdef1027cc items=0 ppid=1467 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:40.439871 kernel: Initializing XFRM netlink socket Dec 13 02:04:40.484537 env[1467]: time="2024-12-13T02:04:40.484482959Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:04:40.514000 audit[1530]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.514000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdbd070e00 a2=0 a3=7ffdbd070dec items=0 ppid=1467 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.514000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:04:40.527000 audit[1533]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.527000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe414448a0 a2=0 a3=7ffe4144488c items=0 ppid=1467 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:04:40.531000 audit[1536]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.531000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc175c0bc0 a2=0 a3=7ffc175c0bac items=0 ppid=1467 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:04:40.534000 audit[1538]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.534000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffb3533050 a2=0 a3=7fffb353303c items=0 ppid=1467 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:04:40.537000 audit[1540]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.537000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff58d536c0 a2=0 a3=7fff58d536ac items=0 ppid=1467 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:04:40.541000 audit[1542]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.541000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdfc6588f0 a2=0 a3=7ffdfc6588dc items=0 ppid=1467 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.541000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:04:40.545000 audit[1544]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.545000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd8c52be10 a2=0 a3=7ffd8c52bdfc items=0 ppid=1467 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:04:40.556000 audit[1547]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.556000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc7f9f2ae0 a2=0 a3=7ffc7f9f2acc items=0 ppid=1467 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:04:40.559000 audit[1549]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.559000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffde6f6c890 a2=0 a3=7ffde6f6c87c items=0 ppid=1467 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:04:40.563000 audit[1551]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.563000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc07cf5a80 a2=0 a3=7ffc07cf5a6c items=0 ppid=1467 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:04:40.566000 audit[1553]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.566000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe235544a0 a2=0 a3=7ffe2355448c items=0 ppid=1467 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:04:40.568379 systemd-networkd[1023]: docker0: Link UP Dec 13 02:04:40.580000 audit[1557]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.580000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff99e5e810 a2=0 a3=7fff99e5e7fc items=0 ppid=1467 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.580000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:40.585000 audit[1558]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:04:40.585000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe91b40ab0 a2=0 a3=7ffe91b40a9c items=0 ppid=1467 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:04:40.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:04:40.586690 env[1467]: time="2024-12-13T02:04:40.586643193Z" level=info msg="Loading containers: done." Dec 13 02:04:40.605321 env[1467]: time="2024-12-13T02:04:40.605260604Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:04:40.605574 env[1467]: time="2024-12-13T02:04:40.605529867Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:04:40.605715 env[1467]: time="2024-12-13T02:04:40.605676180Z" level=info msg="Daemon has completed initialization" Dec 13 02:04:40.625406 systemd[1]: Started docker.service. Dec 13 02:04:40.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:40.637071 env[1467]: time="2024-12-13T02:04:40.637004363Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:04:41.824845 env[1227]: time="2024-12-13T02:04:41.824751371Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 02:04:42.298831 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4094831021.mount: Deactivated successfully. Dec 13 02:04:44.369531 env[1227]: time="2024-12-13T02:04:44.369455841Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.372420 env[1227]: time="2024-12-13T02:04:44.372373614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.374915 env[1227]: time="2024-12-13T02:04:44.374874238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.377368 env[1227]: time="2024-12-13T02:04:44.377326181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:44.378365 env[1227]: time="2024-12-13T02:04:44.378309556Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 02:04:44.395617 env[1227]: time="2024-12-13T02:04:44.395558576Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 02:04:46.332691 env[1227]: time="2024-12-13T02:04:46.332620145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:46.334917 env[1227]: time="2024-12-13T02:04:46.334873397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:46.337336 env[1227]: time="2024-12-13T02:04:46.337297379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:46.339502 env[1227]: time="2024-12-13T02:04:46.339467657Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:46.340519 env[1227]: time="2024-12-13T02:04:46.340468408Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 02:04:46.355395 env[1227]: time="2024-12-13T02:04:46.355337306Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 02:04:46.730985 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:04:46.758736 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 02:04:46.758895 kernel: audit: type=1130 audit(1734055486.729:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:46.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:46.731283 systemd[1]: Stopped kubelet.service. Dec 13 02:04:46.733555 systemd[1]: Starting kubelet.service... Dec 13 02:04:46.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:46.781826 kernel: audit: type=1131 audit(1734055486.729:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:46.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:46.985052 systemd[1]: Started kubelet.service. Dec 13 02:04:47.008852 kernel: audit: type=1130 audit(1734055486.984:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:47.079098 kubelet[1612]: E1213 02:04:47.079037 1612 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:47.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:47.082204 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:47.082355 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:47.104844 kernel: audit: type=1131 audit(1734055487.081:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:47.761909 env[1227]: time="2024-12-13T02:04:47.761831502Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:47.764938 env[1227]: time="2024-12-13T02:04:47.764890669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:47.767713 env[1227]: time="2024-12-13T02:04:47.767671573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:47.769985 env[1227]: time="2024-12-13T02:04:47.769942931Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:47.771008 env[1227]: time="2024-12-13T02:04:47.770963176Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 02:04:47.785156 env[1227]: time="2024-12-13T02:04:47.785112367Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 02:04:48.897201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount625427723.mount: Deactivated successfully. Dec 13 02:04:49.595965 env[1227]: time="2024-12-13T02:04:49.595890207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:49.598558 env[1227]: time="2024-12-13T02:04:49.598511293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:49.600633 env[1227]: time="2024-12-13T02:04:49.600593717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:49.602713 env[1227]: time="2024-12-13T02:04:49.602674865Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:49.603387 env[1227]: time="2024-12-13T02:04:49.603340445Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 02:04:49.617657 env[1227]: time="2024-12-13T02:04:49.617603586Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:04:50.027685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount909729203.mount: Deactivated successfully. Dec 13 02:04:51.178579 env[1227]: time="2024-12-13T02:04:51.178508770Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.181338 env[1227]: time="2024-12-13T02:04:51.181276086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.184063 env[1227]: time="2024-12-13T02:04:51.184027592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.186651 env[1227]: time="2024-12-13T02:04:51.186613517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.188128 env[1227]: time="2024-12-13T02:04:51.188086495Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:04:51.203722 env[1227]: time="2024-12-13T02:04:51.203675340Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:04:51.592625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1287950897.mount: Deactivated successfully. Dec 13 02:04:51.599473 env[1227]: time="2024-12-13T02:04:51.599413465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.602318 env[1227]: time="2024-12-13T02:04:51.602248383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.604900 env[1227]: time="2024-12-13T02:04:51.604862485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.607342 env[1227]: time="2024-12-13T02:04:51.607282632Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:51.608254 env[1227]: time="2024-12-13T02:04:51.608216300Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:04:51.623032 env[1227]: time="2024-12-13T02:04:51.622980442Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 02:04:52.001866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4155204937.mount: Deactivated successfully. Dec 13 02:04:53.173845 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:04:53.197465 kernel: audit: type=1131 audit(1734055493.173:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:53.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:53.210000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:04:53.210000 audit: BPF prog-id=42 op=UNLOAD Dec 13 02:04:53.225333 kernel: audit: type=1334 audit(1734055493.210:241): prog-id=43 op=UNLOAD Dec 13 02:04:53.225436 kernel: audit: type=1334 audit(1734055493.210:242): prog-id=42 op=UNLOAD Dec 13 02:04:53.225483 kernel: audit: type=1334 audit(1734055493.210:243): prog-id=41 op=UNLOAD Dec 13 02:04:53.210000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:04:54.695309 env[1227]: time="2024-12-13T02:04:54.695218122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:54.698331 env[1227]: time="2024-12-13T02:04:54.698282269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:54.700926 env[1227]: time="2024-12-13T02:04:54.700888376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:54.703651 env[1227]: time="2024-12-13T02:04:54.703607003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:04:54.704781 env[1227]: time="2024-12-13T02:04:54.704728127Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 02:04:57.231043 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:04:57.231376 systemd[1]: Stopped kubelet.service. Dec 13 02:04:57.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.255033 kernel: audit: type=1130 audit(1734055497.230:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.255932 systemd[1]: Starting kubelet.service... Dec 13 02:04:57.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.279883 kernel: audit: type=1131 audit(1734055497.230:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.504828 kernel: audit: type=1130 audit(1734055497.482:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:57.482397 systemd[1]: Started kubelet.service. Dec 13 02:04:57.600510 kubelet[1706]: E1213 02:04:57.600440 1706 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:04:57.603166 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:04:57.603370 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:04:57.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:57.626852 kernel: audit: type=1131 audit(1734055497.602:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:58.863664 systemd[1]: Stopped kubelet.service. Dec 13 02:04:58.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:58.867590 systemd[1]: Starting kubelet.service... Dec 13 02:04:58.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:58.909562 kernel: audit: type=1130 audit(1734055498.863:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:58.909683 kernel: audit: type=1131 audit(1734055498.863:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:04:58.922983 systemd[1]: Reloading. Dec 13 02:04:59.061001 /usr/lib/systemd/system-generators/torcx-generator[1741]: time="2024-12-13T02:04:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:04:59.061527 /usr/lib/systemd/system-generators/torcx-generator[1741]: time="2024-12-13T02:04:59Z" level=info msg="torcx already run" Dec 13 02:04:59.161675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:04:59.161704 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:04:59.186936 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.301279 kernel: audit: type=1400 audit(1734055499.279:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342693 kernel: audit: type=1400 audit(1734055499.279:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342863 kernel: audit: type=1400 audit(1734055499.279:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.365497 kernel: audit: type=1400 audit(1734055499.279:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.407331 kernel: audit: type=1400 audit(1734055499.279:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.407456 kernel: audit: type=1400 audit(1734055499.279:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.450691 kernel: audit: type=1400 audit(1734055499.279:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.450880 kernel: audit: type=1400 audit(1734055499.279:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit: BPF prog-id=46 op=LOAD Dec 13 02:04:59.300000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.341000 audit: BPF prog-id=47 op=LOAD Dec 13 02:04:59.341000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit: BPF prog-id=48 op=LOAD Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.363000 audit: BPF prog-id=49 op=LOAD Dec 13 02:04:59.363000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:04:59.363000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.406000 audit: BPF prog-id=50 op=LOAD Dec 13 02:04:59.406000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit: BPF prog-id=51 op=LOAD Dec 13 02:04:59.469000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit: BPF prog-id=52 op=LOAD Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.470000 audit: BPF prog-id=53 op=LOAD Dec 13 02:04:59.470000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:04:59.470000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit: BPF prog-id=54 op=LOAD Dec 13 02:04:59.472000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit: BPF prog-id=55 op=LOAD Dec 13 02:04:59.473000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit: BPF prog-id=56 op=LOAD Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.473000 audit: BPF prog-id=57 op=LOAD Dec 13 02:04:59.473000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:04:59.473000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit: BPF prog-id=58 op=LOAD Dec 13 02:04:59.475000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit: BPF prog-id=59 op=LOAD Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:04:59.475000 audit: BPF prog-id=60 op=LOAD Dec 13 02:04:59.475000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:04:59.475000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:04:59.538977 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:04:59.539116 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:04:59.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:04:59.540025 systemd[1]: Stopped kubelet.service. Dec 13 02:04:59.543038 systemd[1]: Starting kubelet.service... Dec 13 02:05:00.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:00.067455 systemd[1]: Started kubelet.service. Dec 13 02:05:00.138651 kubelet[1785]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:00.139104 kubelet[1785]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:05:00.139179 kubelet[1785]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:00.139329 kubelet[1785]: I1213 02:05:00.139294 1785 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:05:00.511846 kubelet[1785]: I1213 02:05:00.511776 1785 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 02:05:00.511846 kubelet[1785]: I1213 02:05:00.511828 1785 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:05:00.512172 kubelet[1785]: I1213 02:05:00.512136 1785 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 02:05:00.570542 kubelet[1785]: E1213 02:05:00.570490 1785 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.42:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.572195 kubelet[1785]: I1213 02:05:00.572164 1785 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:05:00.587815 kubelet[1785]: I1213 02:05:00.587758 1785 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:05:00.588213 kubelet[1785]: I1213 02:05:00.588189 1785 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:05:00.588643 kubelet[1785]: I1213 02:05:00.588615 1785 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:05:00.588882 kubelet[1785]: I1213 02:05:00.588657 1785 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:05:00.588882 kubelet[1785]: I1213 02:05:00.588675 1785 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:05:00.588882 kubelet[1785]: I1213 02:05:00.588844 1785 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:00.589053 kubelet[1785]: I1213 02:05:00.588990 1785 kubelet.go:396] "Attempting to sync node with API server" Dec 13 02:05:00.589053 kubelet[1785]: I1213 02:05:00.589028 1785 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:05:00.589153 kubelet[1785]: I1213 02:05:00.589077 1785 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:05:00.589153 kubelet[1785]: I1213 02:05:00.589103 1785 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:05:00.593685 kubelet[1785]: W1213 02:05:00.593581 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.593940 kubelet[1785]: E1213 02:05:00.593903 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.594828 kubelet[1785]: W1213 02:05:00.594760 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.42:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.594978 kubelet[1785]: E1213 02:05:00.594960 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.42:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.595192 kubelet[1785]: I1213 02:05:00.595176 1785 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:05:00.610593 kubelet[1785]: I1213 02:05:00.610535 1785 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:05:00.613494 kubelet[1785]: W1213 02:05:00.613445 1785 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:05:00.614350 kubelet[1785]: I1213 02:05:00.614322 1785 server.go:1256] "Started kubelet" Dec 13 02:05:00.614618 kubelet[1785]: I1213 02:05:00.614575 1785 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:05:00.616419 kubelet[1785]: I1213 02:05:00.615545 1785 server.go:461] "Adding debug handlers to kubelet server" Dec 13 02:05:00.617000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.617000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:00.617000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000718e40 a1=c0007944c8 a2=c000718e10 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.617000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:00.617000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.617000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:00.617000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf97a0 a1=c0007944e0 a2=c000718ed0 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.617000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:00.619457 kubelet[1785]: I1213 02:05:00.618682 1785 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:05:00.619457 kubelet[1785]: I1213 02:05:00.618745 1785 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:05:00.619457 kubelet[1785]: I1213 02:05:00.618864 1785 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:05:00.623024 kubelet[1785]: I1213 02:05:00.622998 1785 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:05:00.623426 kubelet[1785]: I1213 02:05:00.623405 1785 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:05:00.623000 audit[1796]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.623000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1e076da0 a2=0 a3=7ffc1e076d8c items=0 ppid=1785 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:05:00.626000 audit[1797]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.626000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb5705160 a2=0 a3=7ffcb570514c items=0 ppid=1785 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:05:00.628970 kubelet[1785]: E1213 02:05:00.628943 1785 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.42:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.42:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal.18109a4a56ed39e1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,UID:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:05:00.614285793 +0000 UTC m=+0.540296863,LastTimestamp:2024-12-13 02:05:00.614285793 +0000 UTC m=+0.540296863,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,}" Dec 13 02:05:00.630614 kubelet[1785]: E1213 02:05:00.630205 1785 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" not found" Dec 13 02:05:00.630614 kubelet[1785]: I1213 02:05:00.630264 1785 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:05:00.630614 kubelet[1785]: I1213 02:05:00.630369 1785 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 02:05:00.631585 kubelet[1785]: I1213 02:05:00.631560 1785 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 02:05:00.632242 kubelet[1785]: W1213 02:05:00.632180 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.632408 kubelet[1785]: E1213 02:05:00.632391 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.633071 kubelet[1785]: E1213 02:05:00.633029 1785 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.42:6443: connect: connection refused" interval="200ms" Dec 13 02:05:00.633424 kubelet[1785]: I1213 02:05:00.633406 1785 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:05:00.633658 kubelet[1785]: I1213 02:05:00.633633 1785 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:05:00.635218 kubelet[1785]: I1213 02:05:00.635197 1785 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:05:00.634000 audit[1799]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.634000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff42c48c10 a2=0 a3=7fff42c48bfc items=0 ppid=1785 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:00.638000 audit[1801]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.638000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe70ed5140 a2=0 a3=7ffe70ed512c items=0 ppid=1785 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:00.649000 audit[1804]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.649000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc1baf7710 a2=0 a3=7ffc1baf76fc items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:05:00.650900 kubelet[1785]: I1213 02:05:00.650797 1785 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:05:00.651000 audit[1805]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:00.651000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe20d71e00 a2=0 a3=7ffe20d71dec items=0 ppid=1785 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:05:00.652709 kubelet[1785]: I1213 02:05:00.652612 1785 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:05:00.652709 kubelet[1785]: I1213 02:05:00.652642 1785 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:05:00.652709 kubelet[1785]: I1213 02:05:00.652665 1785 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 02:05:00.652991 kubelet[1785]: E1213 02:05:00.652749 1785 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:05:00.653000 audit[1807]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.653000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce83b440 a2=0 a3=7ffdce83b42c items=0 ppid=1785 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:05:00.654000 audit[1808]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.654000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa50bbf70 a2=0 a3=7fffa50bbf5c items=0 ppid=1785 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:05:00.657000 audit[1809]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:00.657000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff031ec380 a2=0 a3=7fff031ec36c items=0 ppid=1785 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.657000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:05:00.659000 audit[1810]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:00.659000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe02b5e210 a2=0 a3=7ffe02b5e1fc items=0 ppid=1785 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:05:00.666000 audit[1813]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:00.666000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff784a5f50 a2=0 a3=7fff784a5f3c items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:05:00.667880 kubelet[1785]: W1213 02:05:00.667793 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.667988 kubelet[1785]: E1213 02:05:00.667894 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:00.669000 audit[1815]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:00.669000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0399bd80 a2=0 a3=7ffc0399bd6c items=0 ppid=1785 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:05:00.673223 kubelet[1785]: I1213 02:05:00.673200 1785 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:05:00.673223 kubelet[1785]: I1213 02:05:00.673226 1785 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:05:00.673392 kubelet[1785]: I1213 02:05:00.673248 1785 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:00.675875 kubelet[1785]: I1213 02:05:00.675853 1785 policy_none.go:49] "None policy: Start" Dec 13 02:05:00.676948 kubelet[1785]: I1213 02:05:00.676913 1785 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:05:00.676948 kubelet[1785]: I1213 02:05:00.676944 1785 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:05:00.684229 systemd[1]: Created slice kubepods.slice. Dec 13 02:05:00.691226 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:05:00.700920 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:05:00.702781 kubelet[1785]: I1213 02:05:00.702740 1785 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:05:00.702000 audit[1785]: AVC avc: denied { mac_admin } for pid=1785 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:00.702000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:00.702000 audit[1785]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ef6120 a1=c000ec1e78 a2=c000ef60f0 a3=25 items=0 ppid=1 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:00.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:00.704444 kubelet[1785]: I1213 02:05:00.704428 1785 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:05:00.704848 kubelet[1785]: I1213 02:05:00.704829 1785 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:05:00.706541 kubelet[1785]: E1213 02:05:00.706507 1785 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" not found" Dec 13 02:05:00.738194 kubelet[1785]: I1213 02:05:00.738137 1785 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.738630 kubelet[1785]: E1213 02:05:00.738594 1785 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.42:6443/api/v1/nodes\": dial tcp 10.128.0.42:6443: connect: connection refused" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.753851 kubelet[1785]: I1213 02:05:00.753793 1785 topology_manager.go:215] "Topology Admit Handler" podUID="227c1520732d91cf05ee4673a31d6c55" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.760360 kubelet[1785]: I1213 02:05:00.760316 1785 topology_manager.go:215] "Topology Admit Handler" podUID="7b545da718266c2a201309ace14c3113" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.767489 kubelet[1785]: I1213 02:05:00.766377 1785 topology_manager.go:215] "Topology Admit Handler" podUID="c048bc55df61b6dfbfe3ffc09145492c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.775076 systemd[1]: Created slice kubepods-burstable-pod227c1520732d91cf05ee4673a31d6c55.slice. Dec 13 02:05:00.790783 systemd[1]: Created slice kubepods-burstable-pod7b545da718266c2a201309ace14c3113.slice. Dec 13 02:05:00.800541 systemd[1]: Created slice kubepods-burstable-podc048bc55df61b6dfbfe3ffc09145492c.slice. Dec 13 02:05:00.833790 kubelet[1785]: E1213 02:05:00.833733 1785 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.42:6443: connect: connection refused" interval="400ms" Dec 13 02:05:00.933558 kubelet[1785]: I1213 02:05:00.933488 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933756 kubelet[1785]: I1213 02:05:00.933663 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933756 kubelet[1785]: I1213 02:05:00.933708 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933756 kubelet[1785]: I1213 02:05:00.933752 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933995 kubelet[1785]: I1213 02:05:00.933789 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c048bc55df61b6dfbfe3ffc09145492c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"c048bc55df61b6dfbfe3ffc09145492c\") " pod="kube-system/kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933995 kubelet[1785]: I1213 02:05:00.933845 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933995 kubelet[1785]: I1213 02:05:00.933885 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.933995 kubelet[1785]: I1213 02:05:00.933921 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.934185 kubelet[1785]: I1213 02:05:00.933963 1785 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.945467 kubelet[1785]: I1213 02:05:00.945434 1785 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:00.945891 kubelet[1785]: E1213 02:05:00.945856 1785 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.42:6443/api/v1/nodes\": dial tcp 10.128.0.42:6443: connect: connection refused" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:01.088277 env[1227]: time="2024-12-13T02:05:01.088114486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:227c1520732d91cf05ee4673a31d6c55,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:01.099393 env[1227]: time="2024-12-13T02:05:01.099030164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:7b545da718266c2a201309ace14c3113,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:01.104612 env[1227]: time="2024-12-13T02:05:01.104555117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:c048bc55df61b6dfbfe3ffc09145492c,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:01.176964 kubelet[1785]: E1213 02:05:01.176902 1785 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.42:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.42:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal.18109a4a56ed39e1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,UID:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 02:05:00.614285793 +0000 UTC m=+0.540296863,LastTimestamp:2024-12-13 02:05:00.614285793 +0000 UTC m=+0.540296863,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,}" Dec 13 02:05:01.235362 kubelet[1785]: E1213 02:05:01.235311 1785 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.42:6443: connect: connection refused" interval="800ms" Dec 13 02:05:01.352679 kubelet[1785]: I1213 02:05:01.352516 1785 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:01.353535 kubelet[1785]: E1213 02:05:01.353497 1785 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.42:6443/api/v1/nodes\": dial tcp 10.128.0.42:6443: connect: connection refused" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:01.435645 kubelet[1785]: W1213 02:05:01.435549 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.435645 kubelet[1785]: E1213 02:05:01.435627 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.42:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.485570 kubelet[1785]: W1213 02:05:01.485479 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.485570 kubelet[1785]: E1213 02:05:01.485569 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.42:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.529871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3948467882.mount: Deactivated successfully. Dec 13 02:05:01.539799 env[1227]: time="2024-12-13T02:05:01.539744556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.541182 env[1227]: time="2024-12-13T02:05:01.541126972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.544125 env[1227]: time="2024-12-13T02:05:01.544082324Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.545827 env[1227]: time="2024-12-13T02:05:01.545748185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.548421 env[1227]: time="2024-12-13T02:05:01.548382286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.550111 env[1227]: time="2024-12-13T02:05:01.550061261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.551556 env[1227]: time="2024-12-13T02:05:01.551518469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.559737 env[1227]: time="2024-12-13T02:05:01.559670858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.561141 env[1227]: time="2024-12-13T02:05:01.561087269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.561997 env[1227]: time="2024-12-13T02:05:01.561948401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.566130 env[1227]: time="2024-12-13T02:05:01.566095700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.569369 env[1227]: time="2024-12-13T02:05:01.569308505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:01.579559 kubelet[1785]: W1213 02:05:01.579479 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.42:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.579559 kubelet[1785]: E1213 02:05:01.579554 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.42:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.598330 env[1227]: time="2024-12-13T02:05:01.598160371Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:01.598494 env[1227]: time="2024-12-13T02:05:01.598262438Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:01.599391 env[1227]: time="2024-12-13T02:05:01.598313975Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:01.599391 env[1227]: time="2024-12-13T02:05:01.599104255Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daecc8752b2b75381cf902021ddbe654e2cebdc6ffd6abad3d016570aecbbf0f pid=1823 runtime=io.containerd.runc.v2 Dec 13 02:05:01.625035 env[1227]: time="2024-12-13T02:05:01.623856186Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:01.625035 env[1227]: time="2024-12-13T02:05:01.623912992Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:01.625454 env[1227]: time="2024-12-13T02:05:01.623931038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:01.625790 env[1227]: time="2024-12-13T02:05:01.625713577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d5390391981f70c149acb611c4196e53d8f000fd6bf4acf6b042a6518dd7bcb pid=1848 runtime=io.containerd.runc.v2 Dec 13 02:05:01.628734 systemd[1]: Started cri-containerd-daecc8752b2b75381cf902021ddbe654e2cebdc6ffd6abad3d016570aecbbf0f.scope. Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.656000 audit: BPF prog-id=61 op=LOAD Dec 13 02:05:01.657000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.661243 env[1227]: time="2024-12-13T02:05:01.661139226Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:01.661243 env[1227]: time="2024-12-13T02:05:01.661205524Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:01.657000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1823 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656363383735326232623735333831636639303230323164646265 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1823 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656363383735326232623735333831636639303230323164646265 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit: BPF prog-id=62 op=LOAD Dec 13 02:05:01.659000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031eee0 items=0 ppid=1823 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656363383735326232623735333831636639303230323164646265 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.659000 audit: BPF prog-id=63 op=LOAD Dec 13 02:05:01.659000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031ef28 items=0 ppid=1823 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656363383735326232623735333831636639303230323164646265 Dec 13 02:05:01.659000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:05:01.659000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.660000 audit: BPF prog-id=64 op=LOAD Dec 13 02:05:01.660000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031f338 items=0 ppid=1823 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461656363383735326232623735333831636639303230323164646265 Dec 13 02:05:01.665198 env[1227]: time="2024-12-13T02:05:01.661225563Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:01.665198 env[1227]: time="2024-12-13T02:05:01.662582440Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42814872b264a4f8d1cee07f79f910dd5d23d77462085bb5b0f8957dc3ae2973 pid=1873 runtime=io.containerd.runc.v2 Dec 13 02:05:01.678934 systemd[1]: Started cri-containerd-2d5390391981f70c149acb611c4196e53d8f000fd6bf4acf6b042a6518dd7bcb.scope. Dec 13 02:05:01.705788 systemd[1]: Started cri-containerd-42814872b264a4f8d1cee07f79f910dd5d23d77462085bb5b0f8957dc3ae2973.scope. Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.724000 audit: BPF prog-id=65 op=LOAD Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1848 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353339303339313938316637306331343961636236313163343139 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1848 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353339303339313938316637306331343961636236313163343139 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit: BPF prog-id=66 op=LOAD Dec 13 02:05:01.725000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000358ae0 items=0 ppid=1848 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353339303339313938316637306331343961636236313163343139 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit: BPF prog-id=67 op=LOAD Dec 13 02:05:01.725000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000358b28 items=0 ppid=1848 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353339303339313938316637306331343961636236313163343139 Dec 13 02:05:01.725000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:05:01.725000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.725000 audit: BPF prog-id=68 op=LOAD Dec 13 02:05:01.725000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358f38 items=0 ppid=1848 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353339303339313938316637306331343961636236313163343139 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.735000 audit: BPF prog-id=69 op=LOAD Dec 13 02:05:01.737000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.737000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383134383732623236346134663864316365653037663739663931 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383134383732623236346134663864316365653037663739663931 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit: BPF prog-id=70 op=LOAD Dec 13 02:05:01.742000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000213040 items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383134383732623236346134663864316365653037663739663931 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit: BPF prog-id=71 op=LOAD Dec 13 02:05:01.742000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213088 items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383134383732623236346134663864316365653037663739663931 Dec 13 02:05:01.742000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:05:01.742000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.742000 audit: BPF prog-id=72 op=LOAD Dec 13 02:05:01.742000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213498 items=0 ppid=1873 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383134383732623236346134663864316365653037663739663931 Dec 13 02:05:01.761465 env[1227]: time="2024-12-13T02:05:01.761405033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:7b545da718266c2a201309ace14c3113,Namespace:kube-system,Attempt:0,} returns sandbox id \"daecc8752b2b75381cf902021ddbe654e2cebdc6ffd6abad3d016570aecbbf0f\"" Dec 13 02:05:01.764442 kubelet[1785]: E1213 02:05:01.764412 1785 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flat" Dec 13 02:05:01.767582 env[1227]: time="2024-12-13T02:05:01.767522125Z" level=info msg="CreateContainer within sandbox \"daecc8752b2b75381cf902021ddbe654e2cebdc6ffd6abad3d016570aecbbf0f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:05:01.790301 env[1227]: time="2024-12-13T02:05:01.790252586Z" level=info msg="CreateContainer within sandbox \"daecc8752b2b75381cf902021ddbe654e2cebdc6ffd6abad3d016570aecbbf0f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6435f0b08d748d4275c25c37fd4a2ab127541642fcc77a1b3dedc00b68a4a479\"" Dec 13 02:05:01.791838 env[1227]: time="2024-12-13T02:05:01.791777732Z" level=info msg="StartContainer for \"6435f0b08d748d4275c25c37fd4a2ab127541642fcc77a1b3dedc00b68a4a479\"" Dec 13 02:05:01.808408 kubelet[1785]: W1213 02:05:01.807699 1785 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.808408 kubelet[1785]: E1213 02:05:01.807792 1785 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.42:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.42:6443: connect: connection refused Dec 13 02:05:01.811729 env[1227]: time="2024-12-13T02:05:01.810207366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:227c1520732d91cf05ee4673a31d6c55,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d5390391981f70c149acb611c4196e53d8f000fd6bf4acf6b042a6518dd7bcb\"" Dec 13 02:05:01.812369 kubelet[1785]: E1213 02:05:01.812135 1785 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-21291" Dec 13 02:05:01.818145 env[1227]: time="2024-12-13T02:05:01.818102684Z" level=info msg="CreateContainer within sandbox \"2d5390391981f70c149acb611c4196e53d8f000fd6bf4acf6b042a6518dd7bcb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:05:01.833007 systemd[1]: Started cri-containerd-6435f0b08d748d4275c25c37fd4a2ab127541642fcc77a1b3dedc00b68a4a479.scope. Dec 13 02:05:01.859198 env[1227]: time="2024-12-13T02:05:01.859136364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal,Uid:c048bc55df61b6dfbfe3ffc09145492c,Namespace:kube-system,Attempt:0,} returns sandbox id \"42814872b264a4f8d1cee07f79f910dd5d23d77462085bb5b0f8957dc3ae2973\"" Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.861000 audit: BPF prog-id=73 op=LOAD Dec 13 02:05:01.863622 env[1227]: time="2024-12-13T02:05:01.862224274Z" level=info msg="CreateContainer within sandbox \"2d5390391981f70c149acb611c4196e53d8f000fd6bf4acf6b042a6518dd7bcb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cb93a82247330a157714a06d9d2d7ecdbe9a757e2ab4b988c1e1817b4bbb83d7\"" Dec 13 02:05:01.863622 env[1227]: time="2024-12-13T02:05:01.863095264Z" level=info msg="StartContainer for \"cb93a82247330a157714a06d9d2d7ecdbe9a757e2ab4b988c1e1817b4bbb83d7\"" Dec 13 02:05:01.863758 kubelet[1785]: E1213 02:05:01.861539 1785 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-21291" Dec 13 02:05:01.863000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.863000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1823 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333566306230386437343864343237356332356333376664346132 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.865287 env[1227]: time="2024-12-13T02:05:01.865243540Z" level=info msg="CreateContainer within sandbox \"42814872b264a4f8d1cee07f79f910dd5d23d77462085bb5b0f8957dc3ae2973\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:05:01.864000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1823 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333566306230386437343864343237356332356333376664346132 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.864000 audit: BPF prog-id=74 op=LOAD Dec 13 02:05:01.864000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000418270 items=0 ppid=1823 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333566306230386437343864343237356332356333376664346132 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.866000 audit: BPF prog-id=75 op=LOAD Dec 13 02:05:01.866000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0004182b8 items=0 ppid=1823 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333566306230386437343864343237356332356333376664346132 Dec 13 02:05:01.867000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:05:01.867000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.867000 audit: BPF prog-id=76 op=LOAD Dec 13 02:05:01.867000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004186c8 items=0 ppid=1823 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333566306230386437343864343237356332356333376664346132 Dec 13 02:05:01.892271 systemd[1]: Started cri-containerd-cb93a82247330a157714a06d9d2d7ecdbe9a757e2ab4b988c1e1817b4bbb83d7.scope. Dec 13 02:05:01.905484 env[1227]: time="2024-12-13T02:05:01.905425405Z" level=info msg="CreateContainer within sandbox \"42814872b264a4f8d1cee07f79f910dd5d23d77462085bb5b0f8957dc3ae2973\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5efbe10c962077ec4d8b525ae01471acdd09c1366714fcd9932571be2bc32041\"" Dec 13 02:05:01.906417 env[1227]: time="2024-12-13T02:05:01.906375411Z" level=info msg="StartContainer for \"5efbe10c962077ec4d8b525ae01471acdd09c1366714fcd9932571be2bc32041\"" Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.930000 audit: BPF prog-id=77 op=LOAD Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1848 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393361383232343733333061313537373134613036643964326437 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1848 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393361383232343733333061313537373134613036643964326437 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit: BPF prog-id=78 op=LOAD Dec 13 02:05:01.931000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c42e0 items=0 ppid=1848 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393361383232343733333061313537373134613036643964326437 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit: BPF prog-id=79 op=LOAD Dec 13 02:05:01.931000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c4328 items=0 ppid=1848 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393361383232343733333061313537373134613036643964326437 Dec 13 02:05:01.931000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:05:01.931000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:01.931000 audit: BPF prog-id=80 op=LOAD Dec 13 02:05:01.931000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c4738 items=0 ppid=1848 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:01.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362393361383232343733333061313537373134613036643964326437 Dec 13 02:05:01.972685 systemd[1]: Started cri-containerd-5efbe10c962077ec4d8b525ae01471acdd09c1366714fcd9932571be2bc32041.scope. Dec 13 02:05:01.986147 env[1227]: time="2024-12-13T02:05:01.986101208Z" level=info msg="StartContainer for \"6435f0b08d748d4275c25c37fd4a2ab127541642fcc77a1b3dedc00b68a4a479\" returns successfully" Dec 13 02:05:02.009519 env[1227]: time="2024-12-13T02:05:02.009463083Z" level=info msg="StartContainer for \"cb93a82247330a157714a06d9d2d7ecdbe9a757e2ab4b988c1e1817b4bbb83d7\" returns successfully" Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.036000 audit: BPF prog-id=81 op=LOAD Dec 13 02:05:02.038056 kubelet[1785]: E1213 02:05:02.038023 1785 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.42:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.42:6443: connect: connection refused" interval="1.6s" Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1873 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565666265313063393632303737656334643862353235616530313437 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1873 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565666265313063393632303737656334643862353235616530313437 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit: BPF prog-id=82 op=LOAD Dec 13 02:05:02.037000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003eaef0 items=0 ppid=1873 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565666265313063393632303737656334643862353235616530313437 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.037000 audit: BPF prog-id=83 op=LOAD Dec 13 02:05:02.037000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003eaf38 items=0 ppid=1873 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565666265313063393632303737656334643862353235616530313437 Dec 13 02:05:02.037000 audit: BPF prog-id=83 op=UNLOAD Dec 13 02:05:02.037000 audit: BPF prog-id=82 op=UNLOAD Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:02.038000 audit: BPF prog-id=84 op=LOAD Dec 13 02:05:02.038000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003eb348 items=0 ppid=1873 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:02.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565666265313063393632303737656334643862353235616530313437 Dec 13 02:05:02.125676 env[1227]: time="2024-12-13T02:05:02.125613612Z" level=info msg="StartContainer for \"5efbe10c962077ec4d8b525ae01471acdd09c1366714fcd9932571be2bc32041\" returns successfully" Dec 13 02:05:02.166603 kubelet[1785]: I1213 02:05:02.161145 1785 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:04.594890 kernel: kauditd_printk_skb: 556 callbacks suppressed Dec 13 02:05:04.595176 kernel: audit: type=1400 audit(1734055504.573:547): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:04.573000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:04.573000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004d3dc0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:04.678554 kernel: audit: type=1300 audit(1734055504.573:547): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004d3dc0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:04.678758 kernel: audit: type=1327 audit(1734055504.573:547): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:04.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:04.573000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:04.705831 kernel: audit: type=1400 audit(1734055504.573:548): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:04.705978 kernel: audit: type=1300 audit(1734055504.573:548): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008331a0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:04.573000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008331a0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:04.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:04.770841 kernel: audit: type=1327 audit(1734055504.573:548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:05.364000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.393845 kernel: audit: type=1400 audit(1734055505.364:549): avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.364000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00395d290 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.432835 kernel: audit: type=1300 audit(1734055505.364:549): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00395d290 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.364000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.469023 kernel: audit: type=1327 audit(1734055505.364:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.365000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.509885 kernel: audit: type=1400 audit(1734055505.365:550): avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.365000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00353fdc0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.365000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.365000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00395d3b0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.431000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.431000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c006a15800 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.431000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.543000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.543000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c003ea1b40 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.543000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:05.543000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0068d6450 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:05:05.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:05:05.608514 kubelet[1785]: I1213 02:05:05.608443 1785 apiserver.go:52] "Watching apiserver" Dec 13 02:05:05.657268 kubelet[1785]: E1213 02:05:05.657119 1785 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:05.680384 kubelet[1785]: I1213 02:05:05.680337 1785 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:05.731797 kubelet[1785]: I1213 02:05:05.731762 1785 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 02:05:07.783996 update_engine[1217]: I1213 02:05:07.783924 1217 update_attempter.cc:509] Updating boot flags... Dec 13 02:05:08.225711 systemd[1]: Reloading. Dec 13 02:05:08.338740 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-12-13T02:05:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:05:08.339432 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-12-13T02:05:08Z" level=info msg="torcx already run" Dec 13 02:05:08.473819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:05:08.473846 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:05:08.499013 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit: BPF prog-id=85 op=LOAD Dec 13 02:05:08.608000 audit: BPF prog-id=61 op=UNLOAD Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.609000 audit: BPF prog-id=86 op=LOAD Dec 13 02:05:08.609000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.610000 audit: BPF prog-id=87 op=LOAD Dec 13 02:05:08.610000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.612000 audit: BPF prog-id=88 op=LOAD Dec 13 02:05:08.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.613000 audit: BPF prog-id=89 op=LOAD Dec 13 02:05:08.613000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:05:08.613000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.614000 audit: BPF prog-id=90 op=LOAD Dec 13 02:05:08.614000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.616000 audit: BPF prog-id=91 op=LOAD Dec 13 02:05:08.616000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:05:08.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.620000 audit: BPF prog-id=92 op=LOAD Dec 13 02:05:08.620000 audit: BPF prog-id=69 op=UNLOAD Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.623000 audit: BPF prog-id=93 op=LOAD Dec 13 02:05:08.623000 audit: BPF prog-id=77 op=UNLOAD Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit: BPF prog-id=94 op=LOAD Dec 13 02:05:08.626000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit: BPF prog-id=95 op=LOAD Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit: BPF prog-id=96 op=LOAD Dec 13 02:05:08.626000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:05:08.626000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.627000 audit: BPF prog-id=97 op=LOAD Dec 13 02:05:08.627000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit: BPF prog-id=98 op=LOAD Dec 13 02:05:08.630000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit: BPF prog-id=99 op=LOAD Dec 13 02:05:08.631000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit: BPF prog-id=100 op=LOAD Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.631000 audit: BPF prog-id=101 op=LOAD Dec 13 02:05:08.631000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:05:08.631000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit: BPF prog-id=102 op=LOAD Dec 13 02:05:08.633000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit: BPF prog-id=103 op=LOAD Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.633000 audit: BPF prog-id=104 op=LOAD Dec 13 02:05:08.633000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:05:08.633000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:08.634000 audit: BPF prog-id=105 op=LOAD Dec 13 02:05:08.634000 audit: BPF prog-id=65 op=UNLOAD Dec 13 02:05:08.657749 kubelet[1785]: I1213 02:05:08.657713 1785 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:05:08.658317 systemd[1]: Stopping kubelet.service... Dec 13 02:05:08.679234 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:05:08.679506 systemd[1]: Stopped kubelet.service. Dec 13 02:05:08.679598 systemd[1]: kubelet.service: Consumed 1.022s CPU time. Dec 13 02:05:08.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.682128 systemd[1]: Starting kubelet.service... Dec 13 02:05:08.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:08.873494 systemd[1]: Started kubelet.service. Dec 13 02:05:08.977632 kubelet[2143]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:08.978360 kubelet[2143]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:05:08.978464 kubelet[2143]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:05:08.978692 kubelet[2143]: I1213 02:05:08.978651 2143 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:05:08.988798 kubelet[2143]: I1213 02:05:08.988731 2143 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 02:05:08.989026 kubelet[2143]: I1213 02:05:08.989007 2143 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:05:08.989552 kubelet[2143]: I1213 02:05:08.989528 2143 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 02:05:08.992832 kubelet[2143]: I1213 02:05:08.992762 2143 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:05:08.997178 kubelet[2143]: I1213 02:05:08.997143 2143 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:05:09.015961 kubelet[2143]: I1213 02:05:09.015927 2143 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:05:09.016622 kubelet[2143]: I1213 02:05:09.016601 2143 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:05:09.017068 kubelet[2143]: I1213 02:05:09.017035 2143 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:05:09.017297 kubelet[2143]: I1213 02:05:09.017079 2143 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:05:09.017297 kubelet[2143]: I1213 02:05:09.017098 2143 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:05:09.017297 kubelet[2143]: I1213 02:05:09.017146 2143 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:09.017565 kubelet[2143]: I1213 02:05:09.017311 2143 kubelet.go:396] "Attempting to sync node with API server" Dec 13 02:05:09.017565 kubelet[2143]: I1213 02:05:09.017334 2143 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:05:09.017565 kubelet[2143]: I1213 02:05:09.017374 2143 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:05:09.017565 kubelet[2143]: I1213 02:05:09.017397 2143 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:05:09.019006 kubelet[2143]: I1213 02:05:09.018884 2143 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:05:09.020164 kubelet[2143]: I1213 02:05:09.020126 2143 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:05:09.022237 kubelet[2143]: I1213 02:05:09.022209 2143 server.go:1256] "Started kubelet" Dec 13 02:05:09.027000 audit[2143]: AVC avc: denied { mac_admin } for pid=2143 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:09.027000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:09.027000 audit[2143]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f9bf0 a1=c0009be8d0 a2=c0007f9bc0 a3=25 items=0 ppid=1 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:09.027000 audit[2143]: AVC avc: denied { mac_admin } for pid=2143 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:09.027000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:09.027000 audit[2143]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007d0e40 a1=c0009be8e8 a2=c0007f9c80 a3=25 items=0 ppid=1 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:09.028851 kubelet[2143]: I1213 02:05:09.027979 2143 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:05:09.028851 kubelet[2143]: I1213 02:05:09.028037 2143 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:05:09.028851 kubelet[2143]: I1213 02:05:09.028081 2143 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:05:09.038208 kubelet[2143]: I1213 02:05:09.038174 2143 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:05:09.046947 kubelet[2143]: I1213 02:05:09.046921 2143 server.go:461] "Adding debug handlers to kubelet server" Dec 13 02:05:09.058991 kubelet[2143]: I1213 02:05:09.058959 2143 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:05:09.059456 kubelet[2143]: I1213 02:05:09.059436 2143 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:05:09.062776 kubelet[2143]: I1213 02:05:09.062748 2143 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:05:09.066524 kubelet[2143]: I1213 02:05:09.066499 2143 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 02:05:09.068250 kubelet[2143]: I1213 02:05:09.068230 2143 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 02:05:09.098415 kubelet[2143]: I1213 02:05:09.098362 2143 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:05:09.098612 kubelet[2143]: I1213 02:05:09.098552 2143 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:05:09.099634 kubelet[2143]: I1213 02:05:09.099611 2143 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:05:09.101575 kubelet[2143]: I1213 02:05:09.101552 2143 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:05:09.101731 kubelet[2143]: I1213 02:05:09.101714 2143 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:05:09.102130 kubelet[2143]: I1213 02:05:09.102111 2143 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 02:05:09.102338 kubelet[2143]: E1213 02:05:09.102324 2143 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:05:09.118392 kubelet[2143]: I1213 02:05:09.118222 2143 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:05:09.123842 kubelet[2143]: E1213 02:05:09.121513 2143 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:05:09.174828 kubelet[2143]: I1213 02:05:09.174694 2143 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.187080 kubelet[2143]: I1213 02:05:09.187022 2143 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.191094 kubelet[2143]: I1213 02:05:09.188500 2143 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.202625 kubelet[2143]: E1213 02:05:09.202597 2143 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216283 2143 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216338 2143 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216362 2143 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216666 2143 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216697 2143 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:05:09.217386 kubelet[2143]: I1213 02:05:09.216708 2143 policy_none.go:49] "None policy: Start" Dec 13 02:05:09.222422 kubelet[2143]: I1213 02:05:09.220237 2143 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:05:09.222422 kubelet[2143]: I1213 02:05:09.220303 2143 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:05:09.222422 kubelet[2143]: I1213 02:05:09.220712 2143 state_mem.go:75] "Updated machine memory state" Dec 13 02:05:09.228117 kubelet[2143]: I1213 02:05:09.228090 2143 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:05:09.227000 audit[2143]: AVC avc: denied { mac_admin } for pid=2143 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:09.227000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:05:09.227000 audit[2143]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a8150 a1=c000ed40c0 a2=c0009a8120 a3=25 items=0 ppid=1 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:09.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:05:09.228573 kubelet[2143]: I1213 02:05:09.228199 2143 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:05:09.231713 kubelet[2143]: I1213 02:05:09.231551 2143 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:05:09.404006 kubelet[2143]: I1213 02:05:09.403878 2143 topology_manager.go:215] "Topology Admit Handler" podUID="227c1520732d91cf05ee4673a31d6c55" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.404006 kubelet[2143]: I1213 02:05:09.404000 2143 topology_manager.go:215] "Topology Admit Handler" podUID="7b545da718266c2a201309ace14c3113" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.404310 kubelet[2143]: I1213 02:05:09.404064 2143 topology_manager.go:215] "Topology Admit Handler" podUID="c048bc55df61b6dfbfe3ffc09145492c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.413875 kubelet[2143]: W1213 02:05:09.413847 2143 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:09.415940 kubelet[2143]: W1213 02:05:09.415895 2143 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:09.417059 kubelet[2143]: W1213 02:05:09.417029 2143 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 02:05:09.471643 kubelet[2143]: I1213 02:05:09.471492 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c048bc55df61b6dfbfe3ffc09145492c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"c048bc55df61b6dfbfe3ffc09145492c\") " pod="kube-system/kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.471643 kubelet[2143]: I1213 02:05:09.471580 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.471643 kubelet[2143]: I1213 02:05:09.471638 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.471953 kubelet[2143]: I1213 02:05:09.471678 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.471953 kubelet[2143]: I1213 02:05:09.471882 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/227c1520732d91cf05ee4673a31d6c55-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"227c1520732d91cf05ee4673a31d6c55\") " pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.472095 kubelet[2143]: I1213 02:05:09.472012 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.472162 kubelet[2143]: I1213 02:05:09.472101 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.472220 kubelet[2143]: I1213 02:05:09.472194 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:09.472311 kubelet[2143]: I1213 02:05:09.472287 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7b545da718266c2a201309ace14c3113-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal\" (UID: \"7b545da718266c2a201309ace14c3113\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:10.031100 kubelet[2143]: I1213 02:05:10.031049 2143 apiserver.go:52] "Watching apiserver" Dec 13 02:05:10.069303 kubelet[2143]: I1213 02:05:10.069253 2143 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 02:05:10.272601 kubelet[2143]: I1213 02:05:10.272545 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" podStartSLOduration=1.272446132 podStartE2EDuration="1.272446132s" podCreationTimestamp="2024-12-13 02:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:10.239375933 +0000 UTC m=+1.356151597" watchObservedRunningTime="2024-12-13 02:05:10.272446132 +0000 UTC m=+1.389221796" Dec 13 02:05:10.314499 kubelet[2143]: I1213 02:05:10.314366 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" podStartSLOduration=1.314310015 podStartE2EDuration="1.314310015s" podCreationTimestamp="2024-12-13 02:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:10.288237151 +0000 UTC m=+1.405012815" watchObservedRunningTime="2024-12-13 02:05:10.314310015 +0000 UTC m=+1.431085684" Dec 13 02:05:10.351252 kubelet[2143]: I1213 02:05:10.351200 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" podStartSLOduration=1.351143969 podStartE2EDuration="1.351143969s" podCreationTimestamp="2024-12-13 02:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:10.315306135 +0000 UTC m=+1.432081798" watchObservedRunningTime="2024-12-13 02:05:10.351143969 +0000 UTC m=+1.467919633" Dec 13 02:05:10.586367 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 02:05:10.586548 kernel: audit: type=1400 audit(1734055510.574:804): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.640623 kernel: audit: type=1300 audit(1734055510.574:804): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b89680 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b89680 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.687834 kernel: audit: type=1327 audit(1734055510.574:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b89840 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.756024 kernel: audit: type=1400 audit(1734055510.574:805): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.756185 kernel: audit: type=1300 audit(1734055510.574:805): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b89840 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.785231 kernel: audit: type=1327 audit(1734055510.574:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.576000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.811297 kernel: audit: type=1400 audit(1734055510.576:806): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.576000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b89a00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.846013 kernel: audit: type=1300 audit(1734055510.576:806): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b89a00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.875243 kernel: audit: type=1327 audit(1734055510.576:806): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:10.577000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.901871 kernel: audit: type=1400 audit(1734055510.577:807): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:05:10.577000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c1ca40 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:10.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:14.794342 sudo[1457]: pam_unix(sudo:session): session closed for user root Dec 13 02:05:14.793000 audit[1457]: USER_END pid=1457 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:14.793000 audit[1457]: CRED_DISP pid=1457 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:05:14.837295 sshd[1454]: pam_unix(sshd:session): session closed for user core Dec 13 02:05:14.838000 audit[1454]: USER_END pid=1454 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:14.838000 audit[1454]: CRED_DISP pid=1454 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:05:14.842309 systemd-logind[1214]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:05:14.842547 systemd[1]: sshd@8-10.128.0.42:22-139.178.68.195:58910.service: Deactivated successfully. Dec 13 02:05:14.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.42:22-139.178.68.195:58910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:05:14.843733 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:05:14.844205 systemd[1]: session-9.scope: Consumed 6.778s CPU time. Dec 13 02:05:14.845225 systemd-logind[1214]: Removed session 9. Dec 13 02:05:21.106857 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:05:21.107051 kernel: audit: type=1400 audit(1734055521.100:813): avc: denied { watch } for pid=1957 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:05:21.100000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:05:21.100000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cb8540 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:21.169015 kernel: audit: type=1300 audit(1734055521.100:813): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cb8540 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:05:21.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:21.197798 kernel: audit: type=1327 audit(1734055521.100:813): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:05:23.421199 kubelet[2143]: I1213 02:05:23.421166 2143 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:05:23.422967 env[1227]: time="2024-12-13T02:05:23.422888948Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:05:23.423988 kubelet[2143]: I1213 02:05:23.423962 2143 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:05:24.257664 kubelet[2143]: I1213 02:05:24.257615 2143 topology_manager.go:215] "Topology Admit Handler" podUID="880af25c-55cd-4b1c-9b6b-712c16d96630" podNamespace="kube-system" podName="kube-proxy-469wq" Dec 13 02:05:24.265588 systemd[1]: Created slice kubepods-besteffort-pod880af25c_55cd_4b1c_9b6b_712c16d96630.slice. Dec 13 02:05:24.397982 kubelet[2143]: I1213 02:05:24.397949 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mzjlw\" (UniqueName: \"kubernetes.io/projected/880af25c-55cd-4b1c-9b6b-712c16d96630-kube-api-access-mzjlw\") pod \"kube-proxy-469wq\" (UID: \"880af25c-55cd-4b1c-9b6b-712c16d96630\") " pod="kube-system/kube-proxy-469wq" Dec 13 02:05:24.398366 kubelet[2143]: I1213 02:05:24.398342 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/880af25c-55cd-4b1c-9b6b-712c16d96630-kube-proxy\") pod \"kube-proxy-469wq\" (UID: \"880af25c-55cd-4b1c-9b6b-712c16d96630\") " pod="kube-system/kube-proxy-469wq" Dec 13 02:05:24.398589 kubelet[2143]: I1213 02:05:24.398570 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/880af25c-55cd-4b1c-9b6b-712c16d96630-lib-modules\") pod \"kube-proxy-469wq\" (UID: \"880af25c-55cd-4b1c-9b6b-712c16d96630\") " pod="kube-system/kube-proxy-469wq" Dec 13 02:05:24.398775 kubelet[2143]: I1213 02:05:24.398757 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/880af25c-55cd-4b1c-9b6b-712c16d96630-xtables-lock\") pod \"kube-proxy-469wq\" (UID: \"880af25c-55cd-4b1c-9b6b-712c16d96630\") " pod="kube-system/kube-proxy-469wq" Dec 13 02:05:24.439452 kubelet[2143]: I1213 02:05:24.439383 2143 topology_manager.go:215] "Topology Admit Handler" podUID="b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-h5jcb" Dec 13 02:05:24.451267 systemd[1]: Created slice kubepods-besteffort-podb58051c7_a3e4_43de_b6d1_3ee1fc2ddb27.slice. Dec 13 02:05:24.499077 kubelet[2143]: I1213 02:05:24.499034 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhtdr\" (UniqueName: \"kubernetes.io/projected/b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27-kube-api-access-bhtdr\") pod \"tigera-operator-c7ccbd65-h5jcb\" (UID: \"b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27\") " pod="tigera-operator/tigera-operator-c7ccbd65-h5jcb" Dec 13 02:05:24.499442 kubelet[2143]: I1213 02:05:24.499419 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27-var-lib-calico\") pod \"tigera-operator-c7ccbd65-h5jcb\" (UID: \"b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27\") " pod="tigera-operator/tigera-operator-c7ccbd65-h5jcb" Dec 13 02:05:24.577924 env[1227]: time="2024-12-13T02:05:24.577759395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-469wq,Uid:880af25c-55cd-4b1c-9b6b-712c16d96630,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:24.617013 env[1227]: time="2024-12-13T02:05:24.613468415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:24.617013 env[1227]: time="2024-12-13T02:05:24.613554966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:24.617013 env[1227]: time="2024-12-13T02:05:24.613604200Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:24.617479 env[1227]: time="2024-12-13T02:05:24.617408779Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0 pid=2225 runtime=io.containerd.runc.v2 Dec 13 02:05:24.654855 systemd[1]: run-containerd-runc-k8s.io-4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0-runc.d5RSy7.mount: Deactivated successfully. Dec 13 02:05:24.661990 systemd[1]: Started cri-containerd-4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0.scope. Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.718363 kernel: audit: type=1400 audit(1734055524.674:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.718470 kernel: audit: type=1400 audit(1734055524.674:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.738405 env[1227]: time="2024-12-13T02:05:24.738276947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-469wq,Uid:880af25c-55cd-4b1c-9b6b-712c16d96630,Namespace:kube-system,Attempt:0,} returns sandbox id \"4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0\"" Dec 13 02:05:24.740942 kernel: audit: type=1400 audit(1734055524.674:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.744110 env[1227]: time="2024-12-13T02:05:24.744065295Z" level=info msg="CreateContainer within sandbox \"4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.760113 env[1227]: time="2024-12-13T02:05:24.760068773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-h5jcb,Uid:b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:05:24.788545 kernel: audit: type=1400 audit(1734055524.674:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.788690 kernel: audit: type=1400 audit(1734055524.674:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.788729 kernel: audit: type=1400 audit(1734055524.674:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.809917 kernel: audit: type=1400 audit(1734055524.674:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.695000 audit: BPF prog-id=106 op=LOAD Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436363639393361383635323632326563353038613461323230373734 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436363639393361383635323632326563353038613461323230373734 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.708000 audit: BPF prog-id=107 op=LOAD Dec 13 02:05:24.708000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000395550 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436363639393361383635323632326563353038613461323230373734 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit: BPF prog-id=108 op=LOAD Dec 13 02:05:24.716000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000395598 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436363639393361383635323632326563353038613461323230373734 Dec 13 02:05:24.716000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:05:24.716000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.716000 audit: BPF prog-id=109 op=LOAD Dec 13 02:05:24.716000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003959a8 items=0 ppid=2225 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436363639393361383635323632326563353038613461323230373734 Dec 13 02:05:24.839286 env[1227]: time="2024-12-13T02:05:24.838944129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:24.839286 env[1227]: time="2024-12-13T02:05:24.839111534Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:24.839286 env[1227]: time="2024-12-13T02:05:24.839139416Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:24.839934 env[1227]: time="2024-12-13T02:05:24.839870797Z" level=info msg="CreateContainer within sandbox \"4666993a8652622ec508a4a220774a47f1cce35e6547c961c64a39a00098bed0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f5cca43014b6c910678eec03473112b239a68357dd40641cb036e1ee5d3f62d9\"" Dec 13 02:05:24.841004 env[1227]: time="2024-12-13T02:05:24.839883526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27f3f9040b1723560b4887c1794aa835c1d6fbeb9aad081d4a4ea6ba4ff3280a pid=2269 runtime=io.containerd.runc.v2 Dec 13 02:05:24.841427 env[1227]: time="2024-12-13T02:05:24.841306426Z" level=info msg="StartContainer for \"f5cca43014b6c910678eec03473112b239a68357dd40641cb036e1ee5d3f62d9\"" Dec 13 02:05:24.872684 systemd[1]: Started cri-containerd-27f3f9040b1723560b4887c1794aa835c1d6fbeb9aad081d4a4ea6ba4ff3280a.scope. Dec 13 02:05:24.878858 systemd[1]: Started cri-containerd-f5cca43014b6c910678eec03473112b239a68357dd40641cb036e1ee5d3f62d9.scope. Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.904000 audit: BPF prog-id=110 op=LOAD Dec 13 02:05:24.906000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.906000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663366393034306231373233353630623438383763313739346161 Dec 13 02:05:24.906000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.906000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663366393034306231373233353630623438383763313739346161 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.907000 audit: BPF prog-id=111 op=LOAD Dec 13 02:05:24.907000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023a460 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663366393034306231373233353630623438383763313739346161 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.908000 audit: BPF prog-id=112 op=LOAD Dec 13 02:05:24.908000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023a4a8 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663366393034306231373233353630623438383763313739346161 Dec 13 02:05:24.909000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:05:24.909000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.909000 audit: BPF prog-id=113 op=LOAD Dec 13 02:05:24.909000 audit[2286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023a8b8 items=0 ppid=2269 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237663366393034306231373233353630623438383763313739346161 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe99c079d48 items=0 ppid=2225 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636361343330313462366339313036373865656330333437333131 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit: BPF prog-id=114 op=LOAD Dec 13 02:05:24.919000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4d28 items=0 ppid=2225 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636361343330313462366339313036373865656330333437333131 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.919000 audit: BPF prog-id=115 op=LOAD Dec 13 02:05:24.919000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4d78 items=0 ppid=2225 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636361343330313462366339313036373865656330333437333131 Dec 13 02:05:24.920000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:05:24.920000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:24.920000 audit: BPF prog-id=116 op=LOAD Dec 13 02:05:24.920000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4e08 items=0 ppid=2225 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:24.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636361343330313462366339313036373865656330333437333131 Dec 13 02:05:24.944899 env[1227]: time="2024-12-13T02:05:24.944844560Z" level=info msg="StartContainer for \"f5cca43014b6c910678eec03473112b239a68357dd40641cb036e1ee5d3f62d9\" returns successfully" Dec 13 02:05:24.974106 env[1227]: time="2024-12-13T02:05:24.973832381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-h5jcb,Uid:b58051c7-a3e4-43de-b6d1-3ee1fc2ddb27,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"27f3f9040b1723560b4887c1794aa835c1d6fbeb9aad081d4a4ea6ba4ff3280a\"" Dec 13 02:05:24.978420 env[1227]: time="2024-12-13T02:05:24.978366346Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:05:25.050000 audit[2360]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.050000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc59f34290 a2=0 a3=7ffc59f3427c items=0 ppid=2314 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:05:25.054000 audit[2361]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.054000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd63451a80 a2=0 a3=7ffd63451a6c items=0 ppid=2314 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:05:25.060000 audit[2363]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.060000 audit[2364]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.060000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc87717ee0 a2=0 a3=7ffc87717ecc items=0 ppid=2314 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:05:25.060000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb7a2d4a0 a2=0 a3=7fffb7a2d48c items=0 ppid=2314 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:05:25.064000 audit[2365]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.064000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde7c89ca0 a2=0 a3=7ffde7c89c8c items=0 ppid=2314 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:05:25.065000 audit[2366]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.065000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff17275340 a2=0 a3=7fff1727532c items=0 ppid=2314 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:05:25.153000 audit[2368]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.153000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0b1846b0 a2=0 a3=7ffc0b18469c items=0 ppid=2314 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:05:25.160000 audit[2370]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.160000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffecd99dad0 a2=0 a3=7ffecd99dabc items=0 ppid=2314 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:05:25.167000 audit[2373]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.167000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff957f5350 a2=0 a3=7fff957f533c items=0 ppid=2314 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:05:25.169000 audit[2374]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.169000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6f92bda0 a2=0 a3=7ffd6f92bd8c items=0 ppid=2314 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:05:25.174000 audit[2376]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.174000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeab132e70 a2=0 a3=7ffeab132e5c items=0 ppid=2314 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:05:25.176000 audit[2377]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.176000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd57c3e80 a2=0 a3=7ffdd57c3e6c items=0 ppid=2314 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:05:25.180000 audit[2379]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.180000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefc425260 a2=0 a3=7ffefc42524c items=0 ppid=2314 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:05:25.187000 audit[2382]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.187000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff325408c0 a2=0 a3=7fff325408ac items=0 ppid=2314 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:05:25.190000 audit[2383]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.190000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda1f9ce10 a2=0 a3=7ffda1f9cdfc items=0 ppid=2314 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:05:25.195000 audit[2385]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.195000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd51a4f50 a2=0 a3=7fffd51a4f3c items=0 ppid=2314 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:05:25.200000 audit[2386]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.200000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc688db10 a2=0 a3=7fffc688dafc items=0 ppid=2314 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:05:25.206000 audit[2388]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.206000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7e42c4b0 a2=0 a3=7fff7e42c49c items=0 ppid=2314 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:25.217132 kubelet[2143]: I1213 02:05:25.217094 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-469wq" podStartSLOduration=1.21701147 podStartE2EDuration="1.21701147s" podCreationTimestamp="2024-12-13 02:05:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:25.215773975 +0000 UTC m=+16.332549648" watchObservedRunningTime="2024-12-13 02:05:25.21701147 +0000 UTC m=+16.333787134" Dec 13 02:05:25.218000 audit[2391]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.218000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd367185b0 a2=0 a3=7ffd3671859c items=0 ppid=2314 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:25.226000 audit[2394]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.226000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf48ff9a0 a2=0 a3=7ffcf48ff98c items=0 ppid=2314 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:05:25.229000 audit[2395]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.229000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe432e4320 a2=0 a3=7ffe432e430c items=0 ppid=2314 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:05:25.233000 audit[2397]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.233000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcb26454c0 a2=0 a3=7ffcb26454ac items=0 ppid=2314 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:25.239000 audit[2400]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.239000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff67d85870 a2=0 a3=7fff67d8585c items=0 ppid=2314 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:25.241000 audit[2401]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.241000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc655371e0 a2=0 a3=7ffc655371cc items=0 ppid=2314 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:05:25.245000 audit[2403]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:05:25.245000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc84d78ca0 a2=0 a3=7ffc84d78c8c items=0 ppid=2314 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:05:25.276000 audit[2409]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.276000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcbb0472f0 a2=0 a3=7ffcbb0472dc items=0 ppid=2314 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.288000 audit[2409]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:25.288000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcbb0472f0 a2=0 a3=7ffcbb0472dc items=0 ppid=2314 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.290000 audit[2414]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.290000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc244e54e0 a2=0 a3=7ffc244e54cc items=0 ppid=2314 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:05:25.294000 audit[2416]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.294000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9eb683c0 a2=0 a3=7fff9eb683ac items=0 ppid=2314 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:05:25.300000 audit[2419]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.300000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd37a3a950 a2=0 a3=7ffd37a3a93c items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:05:25.302000 audit[2420]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.302000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe56bef250 a2=0 a3=7ffe56bef23c items=0 ppid=2314 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:05:25.306000 audit[2422]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.306000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe813ab340 a2=0 a3=7ffe813ab32c items=0 ppid=2314 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:05:25.307000 audit[2423]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.307000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe3569040 a2=0 a3=7fffe356902c items=0 ppid=2314 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:05:25.311000 audit[2425]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.311000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca3a0e470 a2=0 a3=7ffca3a0e45c items=0 ppid=2314 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:05:25.316000 audit[2428]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.316000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffed1734140 a2=0 a3=7ffed173412c items=0 ppid=2314 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:05:25.318000 audit[2429]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.318000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccce7fbe0 a2=0 a3=7ffccce7fbcc items=0 ppid=2314 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:05:25.322000 audit[2431]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.322000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff72fe0800 a2=0 a3=7fff72fe07ec items=0 ppid=2314 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:05:25.324000 audit[2432]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.324000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec2499520 a2=0 a3=7ffec249950c items=0 ppid=2314 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:05:25.328000 audit[2434]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.328000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2043c390 a2=0 a3=7ffe2043c37c items=0 ppid=2314 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:05:25.333000 audit[2437]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.333000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce3199cf0 a2=0 a3=7ffce3199cdc items=0 ppid=2314 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:05:25.338000 audit[2440]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.338000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff80448c20 a2=0 a3=7fff80448c0c items=0 ppid=2314 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:05:25.340000 audit[2441]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.340000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe088b9510 a2=0 a3=7ffe088b94fc items=0 ppid=2314 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:05:25.346000 audit[2443]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.346000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd8332a090 a2=0 a3=7ffd8332a07c items=0 ppid=2314 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:25.352000 audit[2446]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.352000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcc80da5d0 a2=0 a3=7ffcc80da5bc items=0 ppid=2314 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:05:25.354000 audit[2447]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.354000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee556ac70 a2=0 a3=7ffee556ac5c items=0 ppid=2314 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:05:25.357000 audit[2449]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.357000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff3d95ed10 a2=0 a3=7fff3d95ecfc items=0 ppid=2314 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:05:25.359000 audit[2450]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.359000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd0c3b30 a2=0 a3=7fffcd0c3b1c items=0 ppid=2314 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:05:25.363000 audit[2452]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.363000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb6b40510 a2=0 a3=7ffcb6b404fc items=0 ppid=2314 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:25.369000 audit[2455]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:05:25.369000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd55961530 a2=0 a3=7ffd5596151c items=0 ppid=2314 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:05:25.374000 audit[2457]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:05:25.374000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe4bb80ab0 a2=0 a3=7ffe4bb80a9c items=0 ppid=2314 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.374000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:25.375000 audit[2457]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:05:25.375000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe4bb80ab0 a2=0 a3=7ffe4bb80a9c items=0 ppid=2314 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:25.375000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:26.306529 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3923736232.mount: Deactivated successfully. Dec 13 02:05:27.269888 env[1227]: time="2024-12-13T02:05:27.269823420Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.272899 env[1227]: time="2024-12-13T02:05:27.272854000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.275278 env[1227]: time="2024-12-13T02:05:27.275237637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.277633 env[1227]: time="2024-12-13T02:05:27.277579346Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:27.278504 env[1227]: time="2024-12-13T02:05:27.278448852Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:05:27.282670 env[1227]: time="2024-12-13T02:05:27.282623645Z" level=info msg="CreateContainer within sandbox \"27f3f9040b1723560b4887c1794aa835c1d6fbeb9aad081d4a4ea6ba4ff3280a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:05:27.304208 env[1227]: time="2024-12-13T02:05:27.304155552Z" level=info msg="CreateContainer within sandbox \"27f3f9040b1723560b4887c1794aa835c1d6fbeb9aad081d4a4ea6ba4ff3280a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"10c36de21b7b44d742267f96943440291d4826284e0096b9195c7cb86f905780\"" Dec 13 02:05:27.305323 env[1227]: time="2024-12-13T02:05:27.305285215Z" level=info msg="StartContainer for \"10c36de21b7b44d742267f96943440291d4826284e0096b9195c7cb86f905780\"" Dec 13 02:05:27.339364 systemd[1]: Started cri-containerd-10c36de21b7b44d742267f96943440291d4826284e0096b9195c7cb86f905780.scope. Dec 13 02:05:27.367405 kernel: kauditd_printk_skb: 303 callbacks suppressed Dec 13 02:05:27.367557 kernel: audit: type=1400 audit(1734055527.361:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.410921 kernel: audit: type=1400 audit(1734055527.361:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.410985 kernel: audit: type=1400 audit(1734055527.361:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.436228 kernel: audit: type=1400 audit(1734055527.361:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.473568 kernel: audit: type=1400 audit(1734055527.361:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.473701 kernel: audit: type=1400 audit(1734055527.361:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.515843 kernel: audit: type=1400 audit(1734055527.361:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.516023 kernel: audit: type=1400 audit(1734055527.361:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.537096 kernel: audit: type=1400 audit(1734055527.361:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.557335 kernel: audit: type=1400 audit(1734055527.388:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.388000 audit: BPF prog-id=117 op=LOAD Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633336646532316237623434643734323236376639363934333434 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633336646532316237623434643734323236376639363934333434 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit: BPF prog-id=118 op=LOAD Dec 13 02:05:27.389000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a2850 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633336646532316237623434643734323236376639363934333434 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.389000 audit: BPF prog-id=119 op=LOAD Dec 13 02:05:27.389000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a2898 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633336646532316237623434643734323236376639363934333434 Dec 13 02:05:27.453000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:05:27.453000 audit: BPF prog-id=118 op=UNLOAD Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:27.453000 audit: BPF prog-id=120 op=LOAD Dec 13 02:05:27.453000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a2ca8 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:27.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633336646532316237623434643734323236376639363934333434 Dec 13 02:05:27.597567 env[1227]: time="2024-12-13T02:05:27.597496587Z" level=info msg="StartContainer for \"10c36de21b7b44d742267f96943440291d4826284e0096b9195c7cb86f905780\" returns successfully" Dec 13 02:05:30.589000 audit[2498]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:30.589000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffff74670a0 a2=0 a3=7ffff746708c items=0 ppid=2314 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:30.593000 audit[2498]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:30.593000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff74670a0 a2=0 a3=0 items=0 ppid=2314 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:30.603000 audit[2500]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:30.603000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd4e2f7e10 a2=0 a3=7ffd4e2f7dfc items=0 ppid=2314 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:30.608000 audit[2500]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:30.608000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4e2f7e10 a2=0 a3=0 items=0 ppid=2314 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:30.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:30.757308 kubelet[2143]: I1213 02:05:30.757258 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-h5jcb" podStartSLOduration=4.455755457 podStartE2EDuration="6.757181865s" podCreationTimestamp="2024-12-13 02:05:24 +0000 UTC" firstStartedPulling="2024-12-13 02:05:24.977594276 +0000 UTC m=+16.094369927" lastFinishedPulling="2024-12-13 02:05:27.279020693 +0000 UTC m=+18.395796335" observedRunningTime="2024-12-13 02:05:28.224716332 +0000 UTC m=+19.341491999" watchObservedRunningTime="2024-12-13 02:05:30.757181865 +0000 UTC m=+21.873957534" Dec 13 02:05:30.757986 kubelet[2143]: I1213 02:05:30.757649 2143 topology_manager.go:215] "Topology Admit Handler" podUID="cce3d0d7-b752-4045-94c4-7d1e2ef8e695" podNamespace="calico-system" podName="calico-typha-54b89c699c-h6vjm" Dec 13 02:05:30.767327 systemd[1]: Created slice kubepods-besteffort-podcce3d0d7_b752_4045_94c4_7d1e2ef8e695.slice. Dec 13 02:05:30.861169 kubelet[2143]: I1213 02:05:30.861024 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cce3d0d7-b752-4045-94c4-7d1e2ef8e695-tigera-ca-bundle\") pod \"calico-typha-54b89c699c-h6vjm\" (UID: \"cce3d0d7-b752-4045-94c4-7d1e2ef8e695\") " pod="calico-system/calico-typha-54b89c699c-h6vjm" Dec 13 02:05:30.861376 kubelet[2143]: I1213 02:05:30.861189 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cce3d0d7-b752-4045-94c4-7d1e2ef8e695-typha-certs\") pod \"calico-typha-54b89c699c-h6vjm\" (UID: \"cce3d0d7-b752-4045-94c4-7d1e2ef8e695\") " pod="calico-system/calico-typha-54b89c699c-h6vjm" Dec 13 02:05:30.861376 kubelet[2143]: I1213 02:05:30.861246 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5rzcv\" (UniqueName: \"kubernetes.io/projected/cce3d0d7-b752-4045-94c4-7d1e2ef8e695-kube-api-access-5rzcv\") pod \"calico-typha-54b89c699c-h6vjm\" (UID: \"cce3d0d7-b752-4045-94c4-7d1e2ef8e695\") " pod="calico-system/calico-typha-54b89c699c-h6vjm" Dec 13 02:05:30.876455 kubelet[2143]: I1213 02:05:30.876376 2143 topology_manager.go:215] "Topology Admit Handler" podUID="a7271d75-f402-49ae-a513-b25dfbe96eea" podNamespace="calico-system" podName="calico-node-gwq9n" Dec 13 02:05:30.887732 systemd[1]: Created slice kubepods-besteffort-poda7271d75_f402_49ae_a513_b25dfbe96eea.slice. Dec 13 02:05:30.961840 kubelet[2143]: I1213 02:05:30.961734 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-xtables-lock\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962096 kubelet[2143]: I1213 02:05:30.961861 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a7271d75-f402-49ae-a513-b25dfbe96eea-node-certs\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962096 kubelet[2143]: I1213 02:05:30.961923 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-cni-bin-dir\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962096 kubelet[2143]: I1213 02:05:30.961956 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-cni-net-dir\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962096 kubelet[2143]: I1213 02:05:30.962012 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-cni-log-dir\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962096 kubelet[2143]: I1213 02:05:30.962048 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-flexvol-driver-host\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962384 kubelet[2143]: I1213 02:05:30.962113 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-lib-modules\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962384 kubelet[2143]: I1213 02:05:30.962174 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dwcqz\" (UniqueName: \"kubernetes.io/projected/a7271d75-f402-49ae-a513-b25dfbe96eea-kube-api-access-dwcqz\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962384 kubelet[2143]: I1213 02:05:30.962266 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-policysync\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962384 kubelet[2143]: I1213 02:05:30.962329 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-var-run-calico\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962384 kubelet[2143]: I1213 02:05:30.962368 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a7271d75-f402-49ae-a513-b25dfbe96eea-var-lib-calico\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:30.962665 kubelet[2143]: I1213 02:05:30.962508 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7271d75-f402-49ae-a513-b25dfbe96eea-tigera-ca-bundle\") pod \"calico-node-gwq9n\" (UID: \"a7271d75-f402-49ae-a513-b25dfbe96eea\") " pod="calico-system/calico-node-gwq9n" Dec 13 02:05:31.065483 kubelet[2143]: E1213 02:05:31.065446 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.065844 kubelet[2143]: W1213 02:05:31.065796 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.066021 kubelet[2143]: E1213 02:05:31.066002 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.066452 kubelet[2143]: E1213 02:05:31.066435 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.066611 kubelet[2143]: W1213 02:05:31.066590 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.066737 kubelet[2143]: E1213 02:05:31.066717 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.070079 kubelet[2143]: E1213 02:05:31.070054 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.070079 kubelet[2143]: W1213 02:05:31.070080 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.070271 kubelet[2143]: E1213 02:05:31.070110 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.070625 kubelet[2143]: E1213 02:05:31.070573 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.070625 kubelet[2143]: W1213 02:05:31.070594 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.070781 kubelet[2143]: E1213 02:05:31.070737 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.083477 env[1227]: time="2024-12-13T02:05:31.082572341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b89c699c-h6vjm,Uid:cce3d0d7-b752-4045-94c4-7d1e2ef8e695,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.082846 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.084056 kubelet[2143]: W1213 02:05:31.082863 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.083002 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.083328 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.084056 kubelet[2143]: W1213 02:05:31.083347 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.083478 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.083718 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.084056 kubelet[2143]: W1213 02:05:31.083732 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.084056 kubelet[2143]: E1213 02:05:31.083880 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.084583 kubelet[2143]: E1213 02:05:31.084086 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.084583 kubelet[2143]: W1213 02:05:31.084099 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.084583 kubelet[2143]: E1213 02:05:31.084211 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.084583 kubelet[2143]: E1213 02:05:31.084396 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.084583 kubelet[2143]: W1213 02:05:31.084407 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.084583 kubelet[2143]: E1213 02:05:31.084547 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.085018 kubelet[2143]: E1213 02:05:31.084740 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.085018 kubelet[2143]: W1213 02:05:31.084751 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.085018 kubelet[2143]: E1213 02:05:31.084874 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.085193 kubelet[2143]: E1213 02:05:31.085074 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.085193 kubelet[2143]: W1213 02:05:31.085086 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.085306 kubelet[2143]: E1213 02:05:31.085198 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.085424 kubelet[2143]: E1213 02:05:31.085374 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.085424 kubelet[2143]: W1213 02:05:31.085387 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.085603 kubelet[2143]: E1213 02:05:31.085497 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.085784 kubelet[2143]: E1213 02:05:31.085708 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.085784 kubelet[2143]: W1213 02:05:31.085723 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.085983 kubelet[2143]: E1213 02:05:31.085883 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.086099 kubelet[2143]: E1213 02:05:31.086080 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.086099 kubelet[2143]: W1213 02:05:31.086099 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.088152 kubelet[2143]: E1213 02:05:31.088123 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.088984 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.090873 kubelet[2143]: W1213 02:05:31.089002 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.089133 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.089435 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.090873 kubelet[2143]: W1213 02:05:31.089448 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.089582 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.089798 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.090873 kubelet[2143]: W1213 02:05:31.089839 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.090873 kubelet[2143]: E1213 02:05:31.089962 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.091743 kubelet[2143]: E1213 02:05:31.091705 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.091891 kubelet[2143]: W1213 02:05:31.091728 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.092244 kubelet[2143]: E1213 02:05:31.092212 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.093009 kubelet[2143]: E1213 02:05:31.092821 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.093009 kubelet[2143]: W1213 02:05:31.092839 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.094246 kubelet[2143]: E1213 02:05:31.093016 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.094246 kubelet[2143]: E1213 02:05:31.093245 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.094246 kubelet[2143]: W1213 02:05:31.093257 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.094246 kubelet[2143]: E1213 02:05:31.093394 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.094957 kubelet[2143]: E1213 02:05:31.094932 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.094957 kubelet[2143]: W1213 02:05:31.094954 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.095180 kubelet[2143]: E1213 02:05:31.095087 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.095458 kubelet[2143]: E1213 02:05:31.095433 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.095550 kubelet[2143]: W1213 02:05:31.095529 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.095703 kubelet[2143]: E1213 02:05:31.095682 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.096536 kubelet[2143]: E1213 02:05:31.095938 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.096536 kubelet[2143]: W1213 02:05:31.095959 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.096536 kubelet[2143]: E1213 02:05:31.096020 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.096536 kubelet[2143]: E1213 02:05:31.096444 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.096536 kubelet[2143]: W1213 02:05:31.096459 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.096879 kubelet[2143]: E1213 02:05:31.096578 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.096879 kubelet[2143]: E1213 02:05:31.096847 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.096879 kubelet[2143]: W1213 02:05:31.096860 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.097053 kubelet[2143]: E1213 02:05:31.096986 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.097274 kubelet[2143]: E1213 02:05:31.097223 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.097274 kubelet[2143]: W1213 02:05:31.097238 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.097421 kubelet[2143]: E1213 02:05:31.097392 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.097658 kubelet[2143]: E1213 02:05:31.097609 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.097658 kubelet[2143]: W1213 02:05:31.097636 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.098454 kubelet[2143]: E1213 02:05:31.097791 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.098454 kubelet[2143]: E1213 02:05:31.098073 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.098454 kubelet[2143]: W1213 02:05:31.098088 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.098454 kubelet[2143]: E1213 02:05:31.098264 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.109933 kubelet[2143]: E1213 02:05:31.109534 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.109933 kubelet[2143]: W1213 02:05:31.109564 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.109933 kubelet[2143]: E1213 02:05:31.109935 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.110193 kubelet[2143]: W1213 02:05:31.109948 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.110268 kubelet[2143]: E1213 02:05:31.110241 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.110268 kubelet[2143]: W1213 02:05:31.110254 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110548 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.111409 kubelet[2143]: W1213 02:05:31.110564 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110889 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.111409 kubelet[2143]: W1213 02:05:31.110902 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110922 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110960 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110980 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.111409 kubelet[2143]: E1213 02:05:31.110996 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.122831 kubelet[2143]: E1213 02:05:31.119871 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.132668 env[1227]: time="2024-12-13T02:05:31.132556657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:31.132894 env[1227]: time="2024-12-13T02:05:31.132711494Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:31.132894 env[1227]: time="2024-12-13T02:05:31.132779254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:31.133137 env[1227]: time="2024-12-13T02:05:31.133074451Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f4dd56038bfe1e562acf220f63614466f86555211882344b3ba7b55eda11e51 pid=2544 runtime=io.containerd.runc.v2 Dec 13 02:05:31.149627 kubelet[2143]: E1213 02:05:31.149596 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.149938 kubelet[2143]: W1213 02:05:31.149910 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.150143 kubelet[2143]: E1213 02:05:31.150122 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.178598 systemd[1]: Started cri-containerd-4f4dd56038bfe1e562acf220f63614466f86555211882344b3ba7b55eda11e51.scope. Dec 13 02:05:31.183991 kubelet[2143]: I1213 02:05:31.182175 2143 topology_manager.go:215] "Topology Admit Handler" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" podNamespace="calico-system" podName="csi-node-driver-rwvv2" Dec 13 02:05:31.183991 kubelet[2143]: E1213 02:05:31.182598 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:31.198115 env[1227]: time="2024-12-13T02:05:31.198001310Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gwq9n,Uid:a7271d75-f402-49ae-a513-b25dfbe96eea,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:31.225317 env[1227]: time="2024-12-13T02:05:31.224557161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:31.225317 env[1227]: time="2024-12-13T02:05:31.224652300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:31.225317 env[1227]: time="2024-12-13T02:05:31.224673375Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:31.226069 env[1227]: time="2024-12-13T02:05:31.225997860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08 pid=2579 runtime=io.containerd.runc.v2 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.241000 audit: BPF prog-id=121 op=LOAD Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2544 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466346464353630333862666531653536326163663232306636333631 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2544 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466346464353630333862666531653536326163663232306636333631 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit: BPF prog-id=122 op=LOAD Dec 13 02:05:31.242000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031fdf0 items=0 ppid=2544 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466346464353630333862666531653536326163663232306636333631 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit: BPF prog-id=123 op=LOAD Dec 13 02:05:31.242000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031fe38 items=0 ppid=2544 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466346464353630333862666531653536326163663232306636333631 Dec 13 02:05:31.242000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:05:31.242000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.242000 audit: BPF prog-id=124 op=LOAD Dec 13 02:05:31.242000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000388248 items=0 ppid=2544 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466346464353630333862666531653536326163663232306636333631 Dec 13 02:05:31.257971 systemd[1]: Started cri-containerd-4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08.scope. Dec 13 02:05:31.263472 kubelet[2143]: E1213 02:05:31.263440 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.263472 kubelet[2143]: W1213 02:05:31.263470 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.263796 kubelet[2143]: E1213 02:05:31.263501 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.263882 kubelet[2143]: E1213 02:05:31.263866 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.263952 kubelet[2143]: W1213 02:05:31.263882 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.263952 kubelet[2143]: E1213 02:05:31.263915 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.264242 kubelet[2143]: E1213 02:05:31.264207 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.264242 kubelet[2143]: W1213 02:05:31.264228 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.264564 kubelet[2143]: E1213 02:05:31.264248 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.264649 kubelet[2143]: E1213 02:05:31.264571 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.264649 kubelet[2143]: W1213 02:05:31.264585 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.264649 kubelet[2143]: E1213 02:05:31.264605 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.265725 kubelet[2143]: E1213 02:05:31.265702 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.265725 kubelet[2143]: W1213 02:05:31.265723 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.266032 kubelet[2143]: E1213 02:05:31.265745 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.266095 kubelet[2143]: E1213 02:05:31.266060 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.266095 kubelet[2143]: W1213 02:05:31.266074 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.266095 kubelet[2143]: E1213 02:05:31.266094 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.266386 kubelet[2143]: E1213 02:05:31.266367 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.266386 kubelet[2143]: W1213 02:05:31.266386 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.266565 kubelet[2143]: E1213 02:05:31.266409 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.266693 kubelet[2143]: E1213 02:05:31.266675 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.266693 kubelet[2143]: W1213 02:05:31.266693 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.266939 kubelet[2143]: E1213 02:05:31.266712 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.267096 kubelet[2143]: E1213 02:05:31.267077 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.267096 kubelet[2143]: W1213 02:05:31.267097 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.267331 kubelet[2143]: E1213 02:05:31.267117 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.267416 kubelet[2143]: E1213 02:05:31.267394 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.267416 kubelet[2143]: W1213 02:05:31.267409 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.267633 kubelet[2143]: E1213 02:05:31.267429 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.267759 kubelet[2143]: E1213 02:05:31.267738 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.267759 kubelet[2143]: W1213 02:05:31.267757 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.268010 kubelet[2143]: E1213 02:05:31.267777 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.268193 kubelet[2143]: E1213 02:05:31.268121 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.268193 kubelet[2143]: W1213 02:05:31.268137 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.268193 kubelet[2143]: E1213 02:05:31.268159 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.268471 kubelet[2143]: E1213 02:05:31.268454 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.268471 kubelet[2143]: W1213 02:05:31.268468 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.268704 kubelet[2143]: E1213 02:05:31.268487 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.268850 kubelet[2143]: E1213 02:05:31.268772 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.268850 kubelet[2143]: W1213 02:05:31.268787 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.268850 kubelet[2143]: E1213 02:05:31.268819 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.269556 kubelet[2143]: E1213 02:05:31.269416 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.269556 kubelet[2143]: W1213 02:05:31.269456 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.269556 kubelet[2143]: E1213 02:05:31.269477 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.269928 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.274931 kubelet[2143]: W1213 02:05:31.269945 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.269964 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.270314 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.274931 kubelet[2143]: W1213 02:05:31.270327 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.270346 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.270619 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.274931 kubelet[2143]: W1213 02:05:31.270631 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.270649 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.274931 kubelet[2143]: E1213 02:05:31.270946 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.275633 kubelet[2143]: W1213 02:05:31.270959 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.275633 kubelet[2143]: E1213 02:05:31.270981 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.275633 kubelet[2143]: E1213 02:05:31.271246 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.275633 kubelet[2143]: W1213 02:05:31.271258 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.275633 kubelet[2143]: E1213 02:05:31.271276 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.275633 kubelet[2143]: E1213 02:05:31.271665 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.275633 kubelet[2143]: W1213 02:05:31.271678 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.275633 kubelet[2143]: E1213 02:05:31.271699 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.275633 kubelet[2143]: I1213 02:05:31.271741 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b82d29d9-8869-46f0-8ffd-8fe8e76896a2-kubelet-dir\") pod \"csi-node-driver-rwvv2\" (UID: \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\") " pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:31.276206 kubelet[2143]: E1213 02:05:31.272100 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.276206 kubelet[2143]: W1213 02:05:31.272115 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.276206 kubelet[2143]: E1213 02:05:31.272139 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.276206 kubelet[2143]: I1213 02:05:31.272180 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b82d29d9-8869-46f0-8ffd-8fe8e76896a2-socket-dir\") pod \"csi-node-driver-rwvv2\" (UID: \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\") " pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:31.276206 kubelet[2143]: E1213 02:05:31.272522 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.276206 kubelet[2143]: W1213 02:05:31.272538 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.276206 kubelet[2143]: E1213 02:05:31.272561 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.276206 kubelet[2143]: I1213 02:05:31.272596 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvmbf\" (UniqueName: \"kubernetes.io/projected/b82d29d9-8869-46f0-8ffd-8fe8e76896a2-kube-api-access-xvmbf\") pod \"csi-node-driver-rwvv2\" (UID: \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\") " pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:31.276206 kubelet[2143]: E1213 02:05:31.272949 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.276765 kubelet[2143]: W1213 02:05:31.272964 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.276765 kubelet[2143]: E1213 02:05:31.272988 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.276765 kubelet[2143]: I1213 02:05:31.273021 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b82d29d9-8869-46f0-8ffd-8fe8e76896a2-varrun\") pod \"csi-node-driver-rwvv2\" (UID: \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\") " pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:31.276765 kubelet[2143]: E1213 02:05:31.273365 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.276765 kubelet[2143]: W1213 02:05:31.273381 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.276765 kubelet[2143]: E1213 02:05:31.273524 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.276765 kubelet[2143]: I1213 02:05:31.273561 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b82d29d9-8869-46f0-8ffd-8fe8e76896a2-registration-dir\") pod \"csi-node-driver-rwvv2\" (UID: \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\") " pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:31.276765 kubelet[2143]: E1213 02:05:31.273794 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277236 kubelet[2143]: W1213 02:05:31.273821 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.274063 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.274271 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277236 kubelet[2143]: W1213 02:05:31.274283 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.274419 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.274605 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277236 kubelet[2143]: W1213 02:05:31.274615 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.274762 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277236 kubelet[2143]: E1213 02:05:31.275051 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277236 kubelet[2143]: W1213 02:05:31.275063 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.275228 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.275420 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277751 kubelet[2143]: W1213 02:05:31.275434 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.275554 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.275785 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277751 kubelet[2143]: W1213 02:05:31.275797 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.275923 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.276312 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.277751 kubelet[2143]: W1213 02:05:31.276363 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.277751 kubelet[2143]: E1213 02:05:31.276396 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.276701 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.278287 kubelet[2143]: W1213 02:05:31.276716 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.276737 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.277118 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.278287 kubelet[2143]: W1213 02:05:31.277131 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.277150 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.277424 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.278287 kubelet[2143]: W1213 02:05:31.277436 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.278287 kubelet[2143]: E1213 02:05:31.277454 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.375056 kubelet[2143]: E1213 02:05:31.374928 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.375056 kubelet[2143]: W1213 02:05:31.374959 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.375056 kubelet[2143]: E1213 02:05:31.374991 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.381013 kubelet[2143]: E1213 02:05:31.378951 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.381013 kubelet[2143]: W1213 02:05:31.378972 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.381013 kubelet[2143]: E1213 02:05:31.379000 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.381925 kubelet[2143]: E1213 02:05:31.381895 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.381925 kubelet[2143]: W1213 02:05:31.381925 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.382099 kubelet[2143]: E1213 02:05:31.381948 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.383684 env[1227]: time="2024-12-13T02:05:31.383627380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b89c699c-h6vjm,Uid:cce3d0d7-b752-4045-94c4-7d1e2ef8e695,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f4dd56038bfe1e562acf220f63614466f86555211882344b3ba7b55eda11e51\"" Dec 13 02:05:31.383941 kubelet[2143]: E1213 02:05:31.383898 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.384046 kubelet[2143]: W1213 02:05:31.383971 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.384046 kubelet[2143]: E1213 02:05:31.383996 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.384947 kubelet[2143]: E1213 02:05:31.384904 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.384947 kubelet[2143]: W1213 02:05:31.384947 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.385138 kubelet[2143]: E1213 02:05:31.385071 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.385463 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387319 kubelet[2143]: W1213 02:05:31.385479 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.385612 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.385867 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387319 kubelet[2143]: W1213 02:05:31.385879 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.386005 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.386204 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387319 kubelet[2143]: W1213 02:05:31.386214 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.386327 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387319 kubelet[2143]: E1213 02:05:31.386537 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387907 kubelet[2143]: W1213 02:05:31.386548 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.387907 kubelet[2143]: E1213 02:05:31.386652 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387907 kubelet[2143]: E1213 02:05:31.386903 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387907 kubelet[2143]: W1213 02:05:31.386913 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.387907 kubelet[2143]: E1213 02:05:31.387023 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.387907 kubelet[2143]: E1213 02:05:31.387214 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.387907 kubelet[2143]: W1213 02:05:31.387224 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.389385 kubelet[2143]: E1213 02:05:31.388367 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.389385 kubelet[2143]: E1213 02:05:31.388623 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.389385 kubelet[2143]: W1213 02:05:31.388636 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.389385 kubelet[2143]: E1213 02:05:31.388984 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.389385 kubelet[2143]: W1213 02:05:31.388998 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.389385 kubelet[2143]: E1213 02:05:31.389281 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.389385 kubelet[2143]: W1213 02:05:31.389293 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.390195 kubelet[2143]: E1213 02:05:31.389867 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.390195 kubelet[2143]: E1213 02:05:31.389924 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.390195 kubelet[2143]: E1213 02:05:31.389943 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.390195 kubelet[2143]: E1213 02:05:31.390065 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.390195 kubelet[2143]: W1213 02:05:31.390088 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.390888 kubelet[2143]: E1213 02:05:31.390536 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.390888 kubelet[2143]: E1213 02:05:31.390787 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.391208 kubelet[2143]: W1213 02:05:31.391073 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.391337 kubelet[2143]: E1213 02:05:31.391320 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.391710 kubelet[2143]: E1213 02:05:31.391696 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.391880 kubelet[2143]: W1213 02:05:31.391852 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.392054 kubelet[2143]: E1213 02:05:31.392024 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.392428 kubelet[2143]: E1213 02:05:31.392413 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.392556 kubelet[2143]: W1213 02:05:31.392539 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.392751 kubelet[2143]: E1213 02:05:31.392720 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.393158 kubelet[2143]: E1213 02:05:31.393142 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.393281 kubelet[2143]: W1213 02:05:31.393266 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.393506 kubelet[2143]: E1213 02:05:31.393494 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.393889 kubelet[2143]: E1213 02:05:31.393875 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.394156 kubelet[2143]: W1213 02:05:31.394138 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.394357 kubelet[2143]: E1213 02:05:31.394330 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.394975 kubelet[2143]: E1213 02:05:31.394957 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.395094 kubelet[2143]: W1213 02:05:31.395077 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.395387 kubelet[2143]: E1213 02:05:31.395372 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.396776 kubelet[2143]: E1213 02:05:31.396745 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.397140 env[1227]: time="2024-12-13T02:05:31.397103890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:05:31.397619 kubelet[2143]: W1213 02:05:31.397598 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.397837 kubelet[2143]: E1213 02:05:31.397797 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.398339 kubelet[2143]: E1213 02:05:31.398310 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.398498 kubelet[2143]: W1213 02:05:31.398478 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.398686 kubelet[2143]: E1213 02:05:31.398659 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.399122 kubelet[2143]: E1213 02:05:31.399104 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.399286 kubelet[2143]: W1213 02:05:31.399265 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.399586 kubelet[2143]: E1213 02:05:31.399562 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.400109 kubelet[2143]: E1213 02:05:31.400092 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.400278 kubelet[2143]: W1213 02:05:31.400260 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.400490 kubelet[2143]: E1213 02:05:31.400472 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.411000 audit: BPF prog-id=125 op=LOAD Dec 13 02:05:31.413000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.413000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2579 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323664353461663965616561313434343038616336633066336466 Dec 13 02:05:31.413000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.413000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2579 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323664353461663965616561313434343038616336633066336466 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416299 kubelet[2143]: E1213 02:05:31.416278 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:31.416494 kubelet[2143]: W1213 02:05:31.416470 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:31.416680 kubelet[2143]: E1213 02:05:31.416651 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.414000 audit: BPF prog-id=126 op=LOAD Dec 13 02:05:31.414000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002b2f60 items=0 ppid=2579 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323664353461663965616561313434343038616336633066336466 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.416000 audit: BPF prog-id=127 op=LOAD Dec 13 02:05:31.416000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002b2fa8 items=0 ppid=2579 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323664353461663965616561313434343038616336633066336466 Dec 13 02:05:31.416000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:05:31.418000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:31.418000 audit: BPF prog-id=128 op=LOAD Dec 13 02:05:31.418000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002b33b8 items=0 ppid=2579 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323664353461663965616561313434343038616336633066336466 Dec 13 02:05:31.444048 env[1227]: time="2024-12-13T02:05:31.443986330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gwq9n,Uid:a7271d75-f402-49ae-a513-b25dfbe96eea,Namespace:calico-system,Attempt:0,} returns sandbox id \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\"" Dec 13 02:05:31.622000 audit[2685]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:31.622000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd58299b90 a2=0 a3=7ffd58299b7c items=0 ppid=2314 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:31.627000 audit[2685]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:31.627000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd58299b90 a2=0 a3=0 items=0 ppid=2314 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:31.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:32.357845 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4123028910.mount: Deactivated successfully. Dec 13 02:05:33.104085 kubelet[2143]: E1213 02:05:33.104042 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:33.343910 env[1227]: time="2024-12-13T02:05:33.343839721Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:33.346876 env[1227]: time="2024-12-13T02:05:33.346778075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:33.349522 env[1227]: time="2024-12-13T02:05:33.349472914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:33.351571 env[1227]: time="2024-12-13T02:05:33.351520415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:33.352314 env[1227]: time="2024-12-13T02:05:33.352249515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:05:33.358682 env[1227]: time="2024-12-13T02:05:33.354163587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:05:33.386096 env[1227]: time="2024-12-13T02:05:33.386042919Z" level=info msg="CreateContainer within sandbox \"4f4dd56038bfe1e562acf220f63614466f86555211882344b3ba7b55eda11e51\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:05:33.406092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2108568406.mount: Deactivated successfully. Dec 13 02:05:33.413018 env[1227]: time="2024-12-13T02:05:33.412948846Z" level=info msg="CreateContainer within sandbox \"4f4dd56038bfe1e562acf220f63614466f86555211882344b3ba7b55eda11e51\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"07fef14f741a7d7518332efd0c99d5daef6535d3a4823c332e9425a96221e12d\"" Dec 13 02:05:33.414599 env[1227]: time="2024-12-13T02:05:33.414562356Z" level=info msg="StartContainer for \"07fef14f741a7d7518332efd0c99d5daef6535d3a4823c332e9425a96221e12d\"" Dec 13 02:05:33.444754 systemd[1]: Started cri-containerd-07fef14f741a7d7518332efd0c99d5daef6535d3a4823c332e9425a96221e12d.scope. Dec 13 02:05:33.498224 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:05:33.498392 kernel: audit: type=1400 audit(1734055533.471:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519150 kernel: audit: type=1400 audit(1734055533.471:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.540038 kernel: audit: type=1400 audit(1734055533.471:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561368 kernel: audit: type=1400 audit(1734055533.471:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.585937 kernel: audit: type=1400 audit(1734055533.471:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.608834 kernel: audit: type=1400 audit(1734055533.471:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.631911 kernel: audit: type=1400 audit(1734055533.471:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.632166 kernel: audit: type=1400 audit(1734055533.471:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.635133 env[1227]: time="2024-12-13T02:05:33.635083260Z" level=info msg="StartContainer for \"07fef14f741a7d7518332efd0c99d5daef6535d3a4823c332e9425a96221e12d\" returns successfully" Dec 13 02:05:33.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.696154 kernel: audit: type=1400 audit(1734055533.471:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.696323 kernel: audit: type=1400 audit(1734055533.518:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.518000 audit: BPF prog-id=129 op=LOAD Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:33.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037666566313466373431613764373531383333326566643063393964 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:33.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037666566313466373431613764373531383333326566643063393964 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.519000 audit: BPF prog-id=130 op=LOAD Dec 13 02:05:33.519000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003cacc0 items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:33.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037666566313466373431613764373531383333326566643063393964 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.539000 audit: BPF prog-id=131 op=LOAD Dec 13 02:05:33.539000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003cad08 items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:33.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037666566313466373431613764373531383333326566643063393964 Dec 13 02:05:33.561000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:05:33.561000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:33.561000 audit: BPF prog-id=132 op=LOAD Dec 13 02:05:33.561000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003cb118 items=0 ppid=2544 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:33.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037666566313466373431613764373531383333326566643063393964 Dec 13 02:05:34.285284 kubelet[2143]: I1213 02:05:34.285246 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-54b89c699c-h6vjm" podStartSLOduration=2.328663776 podStartE2EDuration="4.285187397s" podCreationTimestamp="2024-12-13 02:05:30 +0000 UTC" firstStartedPulling="2024-12-13 02:05:31.396182713 +0000 UTC m=+22.512958350" lastFinishedPulling="2024-12-13 02:05:33.352706314 +0000 UTC m=+24.469481971" observedRunningTime="2024-12-13 02:05:34.282996276 +0000 UTC m=+25.399771941" watchObservedRunningTime="2024-12-13 02:05:34.285187397 +0000 UTC m=+25.401963116" Dec 13 02:05:34.313483 kubelet[2143]: E1213 02:05:34.313436 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.313711 kubelet[2143]: W1213 02:05:34.313690 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.313870 kubelet[2143]: E1213 02:05:34.313849 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.314460 kubelet[2143]: E1213 02:05:34.314439 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.314641 kubelet[2143]: W1213 02:05:34.314622 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.314770 kubelet[2143]: E1213 02:05:34.314757 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.315223 kubelet[2143]: E1213 02:05:34.315208 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.315359 kubelet[2143]: W1213 02:05:34.315342 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.315489 kubelet[2143]: E1213 02:05:34.315475 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.315954 kubelet[2143]: E1213 02:05:34.315939 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.316122 kubelet[2143]: W1213 02:05:34.316103 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.316241 kubelet[2143]: E1213 02:05:34.316217 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.317979 kubelet[2143]: E1213 02:05:34.317960 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.318121 kubelet[2143]: W1213 02:05:34.318104 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.318235 kubelet[2143]: E1213 02:05:34.318222 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.318623 kubelet[2143]: E1213 02:05:34.318608 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.318751 kubelet[2143]: W1213 02:05:34.318735 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.318896 kubelet[2143]: E1213 02:05:34.318882 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.319319 kubelet[2143]: E1213 02:05:34.319303 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.319483 kubelet[2143]: W1213 02:05:34.319434 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.319632 kubelet[2143]: E1213 02:05:34.319617 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.324370 kubelet[2143]: E1213 02:05:34.324328 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.324543 kubelet[2143]: W1213 02:05:34.324521 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.324685 kubelet[2143]: E1213 02:05:34.324668 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.325254 kubelet[2143]: E1213 02:05:34.325238 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.325403 kubelet[2143]: W1213 02:05:34.325385 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.325538 kubelet[2143]: E1213 02:05:34.325524 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.329153 kubelet[2143]: E1213 02:05:34.329123 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.329324 kubelet[2143]: W1213 02:05:34.329304 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.329462 kubelet[2143]: E1213 02:05:34.329446 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.330686 kubelet[2143]: E1213 02:05:34.329943 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.330686 kubelet[2143]: W1213 02:05:34.329960 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.330686 kubelet[2143]: E1213 02:05:34.329993 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.330686 kubelet[2143]: E1213 02:05:34.330282 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.330686 kubelet[2143]: W1213 02:05:34.330296 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.330686 kubelet[2143]: E1213 02:05:34.330314 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.331101 kubelet[2143]: E1213 02:05:34.330813 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.331101 kubelet[2143]: W1213 02:05:34.330836 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.331101 kubelet[2143]: E1213 02:05:34.330856 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.331613 kubelet[2143]: E1213 02:05:34.331512 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.331613 kubelet[2143]: W1213 02:05:34.331530 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.331613 kubelet[2143]: E1213 02:05:34.331551 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.332132 kubelet[2143]: E1213 02:05:34.332094 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.332132 kubelet[2143]: W1213 02:05:34.332111 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.332132 kubelet[2143]: E1213 02:05:34.332131 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.336040 kubelet[2143]: E1213 02:05:34.336022 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.336207 kubelet[2143]: W1213 02:05:34.336187 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.336344 kubelet[2143]: E1213 02:05:34.336329 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.338946 kubelet[2143]: E1213 02:05:34.338915 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.339102 kubelet[2143]: W1213 02:05:34.339074 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.339248 kubelet[2143]: E1213 02:05:34.339233 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.340853 kubelet[2143]: E1213 02:05:34.339589 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.340853 kubelet[2143]: W1213 02:05:34.339607 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.340853 kubelet[2143]: E1213 02:05:34.339634 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.340853 kubelet[2143]: E1213 02:05:34.339945 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.340853 kubelet[2143]: W1213 02:05:34.339958 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.340853 kubelet[2143]: E1213 02:05:34.339978 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.341507 kubelet[2143]: E1213 02:05:34.341470 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.341507 kubelet[2143]: W1213 02:05:34.341492 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.341650 kubelet[2143]: E1213 02:05:34.341620 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.341892 kubelet[2143]: E1213 02:05:34.341870 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.341892 kubelet[2143]: W1213 02:05:34.341889 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.342046 kubelet[2143]: E1213 02:05:34.342003 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.342861 kubelet[2143]: E1213 02:05:34.342246 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.342861 kubelet[2143]: W1213 02:05:34.342260 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.342861 kubelet[2143]: E1213 02:05:34.342403 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.342861 kubelet[2143]: E1213 02:05:34.342588 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.342861 kubelet[2143]: W1213 02:05:34.342599 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.342861 kubelet[2143]: E1213 02:05:34.342621 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343234 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.344862 kubelet[2143]: W1213 02:05:34.343252 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343372 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343580 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.344862 kubelet[2143]: W1213 02:05:34.343591 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343706 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343936 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.344862 kubelet[2143]: W1213 02:05:34.343948 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.343971 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.344862 kubelet[2143]: E1213 02:05:34.344271 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.345423 kubelet[2143]: W1213 02:05:34.344283 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.345423 kubelet[2143]: E1213 02:05:34.344307 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.345423 kubelet[2143]: E1213 02:05:34.344624 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.345423 kubelet[2143]: W1213 02:05:34.344635 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.345423 kubelet[2143]: E1213 02:05:34.344658 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.345697 kubelet[2143]: E1213 02:05:34.345601 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.345697 kubelet[2143]: W1213 02:05:34.345615 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.345837 kubelet[2143]: E1213 02:05:34.345732 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.346243 kubelet[2143]: E1213 02:05:34.345979 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.346243 kubelet[2143]: W1213 02:05:34.345993 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.346243 kubelet[2143]: E1213 02:05:34.346011 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.347974 kubelet[2143]: E1213 02:05:34.347955 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.348109 kubelet[2143]: W1213 02:05:34.348091 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.348233 kubelet[2143]: E1213 02:05:34.348203 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.351646 kubelet[2143]: E1213 02:05:34.351629 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.352186 kubelet[2143]: W1213 02:05:34.352168 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.352322 kubelet[2143]: E1213 02:05:34.352308 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.354928 kubelet[2143]: E1213 02:05:34.354909 2143 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:05:34.355070 kubelet[2143]: W1213 02:05:34.355053 2143 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:05:34.355188 kubelet[2143]: E1213 02:05:34.355175 2143 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:05:34.372000 audit[2765]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:34.372000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd789f9f50 a2=0 a3=7ffd789f9f3c items=0 ppid=2314 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:34.377000 audit[2765]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:34.377000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd789f9f50 a2=0 a3=7ffd789f9f3c items=0 ppid=2314 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:34.459605 env[1227]: time="2024-12-13T02:05:34.459547827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.462331 env[1227]: time="2024-12-13T02:05:34.462276218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.464710 env[1227]: time="2024-12-13T02:05:34.464659935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.466707 env[1227]: time="2024-12-13T02:05:34.466669051Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:34.467721 env[1227]: time="2024-12-13T02:05:34.467679736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:05:34.471964 env[1227]: time="2024-12-13T02:05:34.471926501Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:05:34.500309 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2607242095.mount: Deactivated successfully. Dec 13 02:05:34.505772 env[1227]: time="2024-12-13T02:05:34.505714730Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6\"" Dec 13 02:05:34.506672 env[1227]: time="2024-12-13T02:05:34.506638770Z" level=info msg="StartContainer for \"841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6\"" Dec 13 02:05:34.549398 systemd[1]: Started cri-containerd-841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6.scope. Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fbcbe944328 items=0 ppid=2579 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316334633664326631363938326536313461623761303264653231 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit: BPF prog-id=133 op=LOAD Dec 13 02:05:34.578000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001e9f58 items=0 ppid=2579 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316334633664326631363938326536313461623761303264653231 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit: BPF prog-id=134 op=LOAD Dec 13 02:05:34.578000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001e9fa8 items=0 ppid=2579 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316334633664326631363938326536313461623761303264653231 Dec 13 02:05:34.578000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:05:34.578000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:34.578000 audit: BPF prog-id=135 op=LOAD Dec 13 02:05:34.578000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000356038 items=0 ppid=2579 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:34.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834316334633664326631363938326536313461623761303264653231 Dec 13 02:05:34.603280 env[1227]: time="2024-12-13T02:05:34.603220784Z" level=info msg="StartContainer for \"841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6\" returns successfully" Dec 13 02:05:34.621634 systemd[1]: cri-containerd-841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6.scope: Deactivated successfully. Dec 13 02:05:34.625000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:05:35.105197 kubelet[2143]: E1213 02:05:35.105153 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:35.249646 env[1227]: time="2024-12-13T02:05:35.249577922Z" level=info msg="shim disconnected" id=841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6 Dec 13 02:05:35.249646 env[1227]: time="2024-12-13T02:05:35.249645847Z" level=warning msg="cleaning up after shim disconnected" id=841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6 namespace=k8s.io Dec 13 02:05:35.249646 env[1227]: time="2024-12-13T02:05:35.249662359Z" level=info msg="cleaning up dead shim" Dec 13 02:05:35.261785 env[1227]: time="2024-12-13T02:05:35.261712763Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:05:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2815 runtime=io.containerd.runc.v2\n" Dec 13 02:05:35.273543 env[1227]: time="2024-12-13T02:05:35.273495358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:05:35.367350 systemd[1]: run-containerd-runc-k8s.io-841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6-runc.Rsoqz9.mount: Deactivated successfully. Dec 13 02:05:35.367893 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-841c4c6d2f16982e614ab7a02de21b9e089bcb3174110426c05f0efdf24792a6-rootfs.mount: Deactivated successfully. Dec 13 02:05:37.105054 kubelet[2143]: E1213 02:05:37.105008 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:39.104180 kubelet[2143]: E1213 02:05:39.104134 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:39.544736 env[1227]: time="2024-12-13T02:05:39.544671922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:39.547707 env[1227]: time="2024-12-13T02:05:39.547623077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:39.550415 env[1227]: time="2024-12-13T02:05:39.550372937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:39.552704 env[1227]: time="2024-12-13T02:05:39.552654765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:39.553959 env[1227]: time="2024-12-13T02:05:39.553631624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:05:39.558867 env[1227]: time="2024-12-13T02:05:39.558782901Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:05:39.581020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1282864678.mount: Deactivated successfully. Dec 13 02:05:39.588915 env[1227]: time="2024-12-13T02:05:39.588851052Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23\"" Dec 13 02:05:39.591056 env[1227]: time="2024-12-13T02:05:39.589702463Z" level=info msg="StartContainer for \"53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23\"" Dec 13 02:05:39.633373 systemd[1]: Started cri-containerd-53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23.scope. Dec 13 02:05:39.678951 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 02:05:39.679162 kernel: audit: type=1400 audit(1734055539.651:994): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.651000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.651000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4e852032f8 items=0 ppid=2579 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:39.714840 kernel: audit: type=1300 audit(1734055539.651:994): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4e852032f8 items=0 ppid=2579 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:39.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533313635666239623135306636363737623832636536353237343230 Dec 13 02:05:39.753825 kernel: audit: type=1327 audit(1734055539.651:994): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533313635666239623135306636363737623832636536353237343230 Dec 13 02:05:39.758200 env[1227]: time="2024-12-13T02:05:39.758147450Z" level=info msg="StartContainer for \"53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23\" returns successfully" Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.782023 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.825023 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.825167 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.825224 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.866966 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.867147 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.908739 kernel: audit: type=1400 audit(1734055539.652:995): avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.652000 audit: BPF prog-id=136 op=LOAD Dec 13 02:05:39.652000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000245e8 items=0 ppid=2579 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:39.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533313635666239623135306636363737623832636536353237343230 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit: BPF prog-id=137 op=LOAD Dec 13 02:05:39.678000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024638 items=0 ppid=2579 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533313635666239623135306636363737623832636536353237343230 Dec 13 02:05:39.678000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:05:39.678000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:39.678000 audit: BPF prog-id=138 op=LOAD Dec 13 02:05:39.678000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000246c8 items=0 ppid=2579 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533313635666239623135306636363737623832636536353237343230 Dec 13 02:05:40.848404 env[1227]: time="2024-12-13T02:05:40.848157364Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:05:40.851574 systemd[1]: cri-containerd-53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23.scope: Deactivated successfully. Dec 13 02:05:40.854000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:05:40.884286 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23-rootfs.mount: Deactivated successfully. Dec 13 02:05:40.895718 kubelet[2143]: I1213 02:05:40.894775 2143 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:05:40.927636 kubelet[2143]: I1213 02:05:40.927592 2143 topology_manager.go:215] "Topology Admit Handler" podUID="34f3f832-181c-4d1c-948b-a208a381b8a6" podNamespace="kube-system" podName="coredns-76f75df574-vmtnj" Dec 13 02:05:40.932566 kubelet[2143]: I1213 02:05:40.932537 2143 topology_manager.go:215] "Topology Admit Handler" podUID="54a720ca-5b3a-4638-9f1c-52ab3f8d28a8" podNamespace="kube-system" podName="coredns-76f75df574-w2dlk" Dec 13 02:05:40.937180 systemd[1]: Created slice kubepods-burstable-pod34f3f832_181c_4d1c_948b_a208a381b8a6.slice. Dec 13 02:05:40.942369 kubelet[2143]: I1213 02:05:40.942336 2143 topology_manager.go:215] "Topology Admit Handler" podUID="71446af3-6b18-4d4d-8adb-dcec326bae05" podNamespace="calico-system" podName="calico-kube-controllers-659cf67c9d-s49nw" Dec 13 02:05:40.945214 kubelet[2143]: I1213 02:05:40.945190 2143 topology_manager.go:215] "Topology Admit Handler" podUID="3a4c48ad-ffa9-4edd-b961-ff7503c17dbf" podNamespace="calico-apiserver" podName="calico-apiserver-bb4b6bfdb-wbqsn" Dec 13 02:05:40.946721 kubelet[2143]: I1213 02:05:40.946694 2143 topology_manager.go:215] "Topology Admit Handler" podUID="cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6" podNamespace="calico-apiserver" podName="calico-apiserver-bb4b6bfdb-vlzl9" Dec 13 02:05:40.951424 systemd[1]: Created slice kubepods-burstable-pod54a720ca_5b3a_4638_9f1c_52ab3f8d28a8.slice. Dec 13 02:05:40.958632 kubelet[2143]: W1213 02:05:40.958588 2143 reflector.go:539] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' and this object Dec 13 02:05:40.958796 kubelet[2143]: E1213 02:05:40.958649 2143 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' and this object Dec 13 02:05:40.963055 kubelet[2143]: W1213 02:05:40.963022 2143 reflector.go:539] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' and this object Dec 13 02:05:40.963298 kubelet[2143]: E1213 02:05:40.963068 2143 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' and this object Dec 13 02:05:40.965797 systemd[1]: Created slice kubepods-besteffort-pod71446af3_6b18_4d4d_8adb_dcec326bae05.slice. Dec 13 02:05:40.975441 systemd[1]: Created slice kubepods-besteffort-pod3a4c48ad_ffa9_4edd_b961_ff7503c17dbf.slice. Dec 13 02:05:40.987944 systemd[1]: Created slice kubepods-besteffort-podcd7a15ed_d9c2_4e50_8fe5_815c83e7cab6.slice. Dec 13 02:05:41.024174 kubelet[2143]: I1213 02:05:41.024136 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/54a720ca-5b3a-4638-9f1c-52ab3f8d28a8-config-volume\") pod \"coredns-76f75df574-w2dlk\" (UID: \"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8\") " pod="kube-system/coredns-76f75df574-w2dlk" Dec 13 02:05:41.025246 kubelet[2143]: I1213 02:05:41.025221 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rv8vw\" (UniqueName: \"kubernetes.io/projected/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-kube-api-access-rv8vw\") pod \"calico-apiserver-bb4b6bfdb-wbqsn\" (UID: \"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf\") " pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" Dec 13 02:05:41.025545 kubelet[2143]: I1213 02:05:41.025523 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-calico-apiserver-certs\") pod \"calico-apiserver-bb4b6bfdb-vlzl9\" (UID: \"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6\") " pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" Dec 13 02:05:41.025749 kubelet[2143]: I1213 02:05:41.025730 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-calico-apiserver-certs\") pod \"calico-apiserver-bb4b6bfdb-wbqsn\" (UID: \"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf\") " pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" Dec 13 02:05:41.025921 kubelet[2143]: I1213 02:05:41.025903 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q42jn\" (UniqueName: \"kubernetes.io/projected/71446af3-6b18-4d4d-8adb-dcec326bae05-kube-api-access-q42jn\") pod \"calico-kube-controllers-659cf67c9d-s49nw\" (UID: \"71446af3-6b18-4d4d-8adb-dcec326bae05\") " pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" Dec 13 02:05:41.026133 kubelet[2143]: I1213 02:05:41.026100 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sscrr\" (UniqueName: \"kubernetes.io/projected/34f3f832-181c-4d1c-948b-a208a381b8a6-kube-api-access-sscrr\") pod \"coredns-76f75df574-vmtnj\" (UID: \"34f3f832-181c-4d1c-948b-a208a381b8a6\") " pod="kube-system/coredns-76f75df574-vmtnj" Dec 13 02:05:41.026446 kubelet[2143]: I1213 02:05:41.026411 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/71446af3-6b18-4d4d-8adb-dcec326bae05-tigera-ca-bundle\") pod \"calico-kube-controllers-659cf67c9d-s49nw\" (UID: \"71446af3-6b18-4d4d-8adb-dcec326bae05\") " pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" Dec 13 02:05:41.026446 kubelet[2143]: I1213 02:05:41.026458 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/34f3f832-181c-4d1c-948b-a208a381b8a6-config-volume\") pod \"coredns-76f75df574-vmtnj\" (UID: \"34f3f832-181c-4d1c-948b-a208a381b8a6\") " pod="kube-system/coredns-76f75df574-vmtnj" Dec 13 02:05:41.026630 kubelet[2143]: I1213 02:05:41.026516 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8vx6\" (UniqueName: \"kubernetes.io/projected/54a720ca-5b3a-4638-9f1c-52ab3f8d28a8-kube-api-access-h8vx6\") pod \"coredns-76f75df574-w2dlk\" (UID: \"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8\") " pod="kube-system/coredns-76f75df574-w2dlk" Dec 13 02:05:41.026630 kubelet[2143]: I1213 02:05:41.026579 2143 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrxtl\" (UniqueName: \"kubernetes.io/projected/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-kube-api-access-vrxtl\") pod \"calico-apiserver-bb4b6bfdb-vlzl9\" (UID: \"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6\") " pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" Dec 13 02:05:41.110371 systemd[1]: Created slice kubepods-besteffort-podb82d29d9_8869_46f0_8ffd_8fe8e76896a2.slice. Dec 13 02:05:41.115087 env[1227]: time="2024-12-13T02:05:41.115038319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rwvv2,Uid:b82d29d9-8869-46f0-8ffd-8fe8e76896a2,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:41.241527 env[1227]: time="2024-12-13T02:05:41.241449391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vmtnj,Uid:34f3f832-181c-4d1c-948b-a208a381b8a6,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:41.259226 env[1227]: time="2024-12-13T02:05:41.259170797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-w2dlk,Uid:54a720ca-5b3a-4638-9f1c-52ab3f8d28a8,Namespace:kube-system,Attempt:0,}" Dec 13 02:05:41.270417 env[1227]: time="2024-12-13T02:05:41.270354154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-659cf67c9d-s49nw,Uid:71446af3-6b18-4d4d-8adb-dcec326bae05,Namespace:calico-system,Attempt:0,}" Dec 13 02:05:41.656855 env[1227]: time="2024-12-13T02:05:41.656766479Z" level=info msg="shim disconnected" id=53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23 Dec 13 02:05:41.656855 env[1227]: time="2024-12-13T02:05:41.656851918Z" level=warning msg="cleaning up after shim disconnected" id=53165fb9b150f6677b82ce6527420ac5ee248dafe9c37387e065982b23bc6c23 namespace=k8s.io Dec 13 02:05:41.657168 env[1227]: time="2024-12-13T02:05:41.656867844Z" level=info msg="cleaning up dead shim" Dec 13 02:05:41.671045 env[1227]: time="2024-12-13T02:05:41.670971906Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:05:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2881 runtime=io.containerd.runc.v2\ntime=\"2024-12-13T02:05:41Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.914211487Z" level=error msg="Failed to destroy network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.914735464Z" level=error msg="encountered an error cleaning up failed sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.914838065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rwvv2,Uid:b82d29d9-8869-46f0-8ffd-8fe8e76896a2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.918870626Z" level=error msg="Failed to destroy network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.919464761Z" level=error msg="encountered an error cleaning up failed sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.929194 env[1227]: time="2024-12-13T02:05:41.919544047Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-w2dlk,Uid:54a720ca-5b3a-4638-9f1c-52ab3f8d28a8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.924402 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88-shm.mount: Deactivated successfully. Dec 13 02:05:41.930340 kubelet[2143]: E1213 02:05:41.915146 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.930340 kubelet[2143]: E1213 02:05:41.915229 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:41.930340 kubelet[2143]: E1213 02:05:41.915265 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rwvv2" Dec 13 02:05:41.938516 kubelet[2143]: E1213 02:05:41.915345 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rwvv2_calico-system(b82d29d9-8869-46f0-8ffd-8fe8e76896a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rwvv2_calico-system(b82d29d9-8869-46f0-8ffd-8fe8e76896a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:41.938516 kubelet[2143]: E1213 02:05:41.919956 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.938516 kubelet[2143]: E1213 02:05:41.920035 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-w2dlk" Dec 13 02:05:41.934108 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89-shm.mount: Deactivated successfully. Dec 13 02:05:41.939262 kubelet[2143]: E1213 02:05:41.920083 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-w2dlk" Dec 13 02:05:41.939262 kubelet[2143]: E1213 02:05:41.920178 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-w2dlk_kube-system(54a720ca-5b3a-4638-9f1c-52ab3f8d28a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-w2dlk_kube-system(54a720ca-5b3a-4638-9f1c-52ab3f8d28a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-w2dlk" podUID="54a720ca-5b3a-4638-9f1c-52ab3f8d28a8" Dec 13 02:05:41.963404 env[1227]: time="2024-12-13T02:05:41.963298385Z" level=error msg="Failed to destroy network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.965242 env[1227]: time="2024-12-13T02:05:41.965179276Z" level=error msg="encountered an error cleaning up failed sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.965497 env[1227]: time="2024-12-13T02:05:41.965439587Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vmtnj,Uid:34f3f832-181c-4d1c-948b-a208a381b8a6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.966453 kubelet[2143]: E1213 02:05:41.965947 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.966453 kubelet[2143]: E1213 02:05:41.966017 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-vmtnj" Dec 13 02:05:41.966453 kubelet[2143]: E1213 02:05:41.966053 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-vmtnj" Dec 13 02:05:41.966710 kubelet[2143]: E1213 02:05:41.966131 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-vmtnj_kube-system(34f3f832-181c-4d1c-948b-a208a381b8a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-vmtnj_kube-system(34f3f832-181c-4d1c-948b-a208a381b8a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-vmtnj" podUID="34f3f832-181c-4d1c-948b-a208a381b8a6" Dec 13 02:05:41.968038 env[1227]: time="2024-12-13T02:05:41.967987770Z" level=error msg="Failed to destroy network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.968640 env[1227]: time="2024-12-13T02:05:41.968592310Z" level=error msg="encountered an error cleaning up failed sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.968957 env[1227]: time="2024-12-13T02:05:41.968896198Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-659cf67c9d-s49nw,Uid:71446af3-6b18-4d4d-8adb-dcec326bae05,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.969643 kubelet[2143]: E1213 02:05:41.969374 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:41.969643 kubelet[2143]: E1213 02:05:41.969439 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" Dec 13 02:05:41.969643 kubelet[2143]: E1213 02:05:41.969479 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" Dec 13 02:05:41.969906 kubelet[2143]: E1213 02:05:41.969560 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-659cf67c9d-s49nw_calico-system(71446af3-6b18-4d4d-8adb-dcec326bae05)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-659cf67c9d-s49nw_calico-system(71446af3-6b18-4d4d-8adb-dcec326bae05)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" podUID="71446af3-6b18-4d4d-8adb-dcec326bae05" Dec 13 02:05:41.971511 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac-shm.mount: Deactivated successfully. Dec 13 02:05:41.976203 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857-shm.mount: Deactivated successfully. Dec 13 02:05:42.127578 kubelet[2143]: E1213 02:05:42.127521 2143 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 02:05:42.127836 kubelet[2143]: E1213 02:05:42.127662 2143 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-calico-apiserver-certs podName:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf nodeName:}" failed. No retries permitted until 2024-12-13 02:05:42.627631721 +0000 UTC m=+33.744407385 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-calico-apiserver-certs") pod "calico-apiserver-bb4b6bfdb-wbqsn" (UID: "3a4c48ad-ffa9-4edd-b961-ff7503c17dbf") : failed to sync secret cache: timed out waiting for the condition Dec 13 02:05:42.129777 kubelet[2143]: E1213 02:05:42.129618 2143 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 02:05:42.129777 kubelet[2143]: E1213 02:05:42.129722 2143 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-calico-apiserver-certs podName:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6 nodeName:}" failed. No retries permitted until 2024-12-13 02:05:42.629697383 +0000 UTC m=+33.746473047 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-calico-apiserver-certs") pod "calico-apiserver-bb4b6bfdb-vlzl9" (UID: "cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6") : failed to sync secret cache: timed out waiting for the condition Dec 13 02:05:42.166691 kubelet[2143]: E1213 02:05:42.166642 2143 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.167037 kubelet[2143]: E1213 02:05:42.166998 2143 projected.go:200] Error preparing data for projected volume kube-api-access-vrxtl for pod calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.167149 kubelet[2143]: E1213 02:05:42.167116 2143 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-kube-api-access-vrxtl podName:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6 nodeName:}" failed. No retries permitted until 2024-12-13 02:05:42.667088248 +0000 UTC m=+33.783863911 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-vrxtl" (UniqueName: "kubernetes.io/projected/cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6-kube-api-access-vrxtl") pod "calico-apiserver-bb4b6bfdb-vlzl9" (UID: "cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6") : failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.167337 kubelet[2143]: E1213 02:05:42.166663 2143 projected.go:294] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.167497 kubelet[2143]: E1213 02:05:42.167479 2143 projected.go:200] Error preparing data for projected volume kube-api-access-rv8vw for pod calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn: failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.167731 kubelet[2143]: E1213 02:05:42.167715 2143 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-kube-api-access-rv8vw podName:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf nodeName:}" failed. No retries permitted until 2024-12-13 02:05:42.667670922 +0000 UTC m=+33.784446587 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rv8vw" (UniqueName: "kubernetes.io/projected/3a4c48ad-ffa9-4edd-b961-ff7503c17dbf-kube-api-access-rv8vw") pod "calico-apiserver-bb4b6bfdb-wbqsn" (UID: "3a4c48ad-ffa9-4edd-b961-ff7503c17dbf") : failed to sync configmap cache: timed out waiting for the condition Dec 13 02:05:42.288502 kubelet[2143]: I1213 02:05:42.288468 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:42.291256 env[1227]: time="2024-12-13T02:05:42.291181094Z" level=info msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" Dec 13 02:05:42.299151 env[1227]: time="2024-12-13T02:05:42.299105648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:05:42.304489 kubelet[2143]: I1213 02:05:42.304456 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:42.305380 env[1227]: time="2024-12-13T02:05:42.305322076Z" level=info msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" Dec 13 02:05:42.306555 kubelet[2143]: I1213 02:05:42.306510 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:42.311980 env[1227]: time="2024-12-13T02:05:42.311938483Z" level=info msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" Dec 13 02:05:42.318527 kubelet[2143]: I1213 02:05:42.317567 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:42.320198 env[1227]: time="2024-12-13T02:05:42.320134653Z" level=info msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" Dec 13 02:05:42.431089 env[1227]: time="2024-12-13T02:05:42.431009516Z" level=error msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" failed" error="failed to destroy network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.432021 kubelet[2143]: E1213 02:05:42.431710 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:42.432021 kubelet[2143]: E1213 02:05:42.431861 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89"} Dec 13 02:05:42.432021 kubelet[2143]: E1213 02:05:42.431928 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:42.432021 kubelet[2143]: E1213 02:05:42.431979 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-w2dlk" podUID="54a720ca-5b3a-4638-9f1c-52ab3f8d28a8" Dec 13 02:05:42.436221 env[1227]: time="2024-12-13T02:05:42.436121576Z" level=error msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" failed" error="failed to destroy network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.436878 kubelet[2143]: E1213 02:05:42.436646 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:42.436878 kubelet[2143]: E1213 02:05:42.436698 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac"} Dec 13 02:05:42.436878 kubelet[2143]: E1213 02:05:42.436757 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34f3f832-181c-4d1c-948b-a208a381b8a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:42.436878 kubelet[2143]: E1213 02:05:42.436818 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34f3f832-181c-4d1c-948b-a208a381b8a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-vmtnj" podUID="34f3f832-181c-4d1c-948b-a208a381b8a6" Dec 13 02:05:42.446135 env[1227]: time="2024-12-13T02:05:42.446059655Z" level=error msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" failed" error="failed to destroy network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.446631 kubelet[2143]: E1213 02:05:42.446593 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:42.446763 kubelet[2143]: E1213 02:05:42.446640 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88"} Dec 13 02:05:42.446763 kubelet[2143]: E1213 02:05:42.446688 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:42.446763 kubelet[2143]: E1213 02:05:42.446735 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b82d29d9-8869-46f0-8ffd-8fe8e76896a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rwvv2" podUID="b82d29d9-8869-46f0-8ffd-8fe8e76896a2" Dec 13 02:05:42.450929 env[1227]: time="2024-12-13T02:05:42.450866643Z" level=error msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" failed" error="failed to destroy network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.451158 kubelet[2143]: E1213 02:05:42.451107 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:42.451158 kubelet[2143]: E1213 02:05:42.451154 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857"} Dec 13 02:05:42.451344 kubelet[2143]: E1213 02:05:42.451206 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"71446af3-6b18-4d4d-8adb-dcec326bae05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:42.451344 kubelet[2143]: E1213 02:05:42.451247 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"71446af3-6b18-4d4d-8adb-dcec326bae05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" podUID="71446af3-6b18-4d4d-8adb-dcec326bae05" Dec 13 02:05:42.782322 env[1227]: time="2024-12-13T02:05:42.782249107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-wbqsn,Uid:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:05:42.793555 env[1227]: time="2024-12-13T02:05:42.793243248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-vlzl9,Uid:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:05:42.961150 env[1227]: time="2024-12-13T02:05:42.961055420Z" level=error msg="Failed to destroy network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.966833 env[1227]: time="2024-12-13T02:05:42.965956498Z" level=error msg="encountered an error cleaning up failed sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.966833 env[1227]: time="2024-12-13T02:05:42.966044045Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-wbqsn,Uid:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.965126 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4-shm.mount: Deactivated successfully. Dec 13 02:05:42.970212 kubelet[2143]: E1213 02:05:42.967554 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.970212 kubelet[2143]: E1213 02:05:42.967626 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" Dec 13 02:05:42.970212 kubelet[2143]: E1213 02:05:42.967666 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" Dec 13 02:05:42.970991 kubelet[2143]: E1213 02:05:42.967744 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-bb4b6bfdb-wbqsn_calico-apiserver(3a4c48ad-ffa9-4edd-b961-ff7503c17dbf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-bb4b6bfdb-wbqsn_calico-apiserver(3a4c48ad-ffa9-4edd-b961-ff7503c17dbf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" podUID="3a4c48ad-ffa9-4edd-b961-ff7503c17dbf" Dec 13 02:05:42.986464 env[1227]: time="2024-12-13T02:05:42.986405780Z" level=error msg="Failed to destroy network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.987107 env[1227]: time="2024-12-13T02:05:42.987053024Z" level=error msg="encountered an error cleaning up failed sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.987423 env[1227]: time="2024-12-13T02:05:42.987283884Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-vlzl9,Uid:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.988299 kubelet[2143]: E1213 02:05:42.987853 2143 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:42.988299 kubelet[2143]: E1213 02:05:42.987918 2143 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" Dec 13 02:05:42.988299 kubelet[2143]: E1213 02:05:42.987972 2143 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" Dec 13 02:05:42.988650 kubelet[2143]: E1213 02:05:42.988051 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-bb4b6bfdb-vlzl9_calico-apiserver(cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-bb4b6bfdb-vlzl9_calico-apiserver(cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" podUID="cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6" Dec 13 02:05:42.990496 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125-shm.mount: Deactivated successfully. Dec 13 02:05:43.320655 kubelet[2143]: I1213 02:05:43.320413 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:43.324680 env[1227]: time="2024-12-13T02:05:43.324500463Z" level=info msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" Dec 13 02:05:43.337478 kubelet[2143]: I1213 02:05:43.337256 2143 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:43.341979 env[1227]: time="2024-12-13T02:05:43.341914833Z" level=info msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" Dec 13 02:05:43.456930 env[1227]: time="2024-12-13T02:05:43.456846650Z" level=error msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" failed" error="failed to destroy network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:43.457676 kubelet[2143]: E1213 02:05:43.457397 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:43.457676 kubelet[2143]: E1213 02:05:43.457472 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125"} Dec 13 02:05:43.457676 kubelet[2143]: E1213 02:05:43.457557 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:43.457676 kubelet[2143]: E1213 02:05:43.457621 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" podUID="cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6" Dec 13 02:05:43.465454 env[1227]: time="2024-12-13T02:05:43.465371739Z" level=error msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" failed" error="failed to destroy network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:05:43.466128 kubelet[2143]: E1213 02:05:43.465877 2143 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:43.466128 kubelet[2143]: E1213 02:05:43.465953 2143 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4"} Dec 13 02:05:43.466128 kubelet[2143]: E1213 02:05:43.466029 2143 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:05:43.466128 kubelet[2143]: E1213 02:05:43.466077 2143 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" podUID="3a4c48ad-ffa9-4edd-b961-ff7503c17dbf" Dec 13 02:05:49.493360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4232862614.mount: Deactivated successfully. Dec 13 02:05:49.527827 env[1227]: time="2024-12-13T02:05:49.527734895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:49.530692 env[1227]: time="2024-12-13T02:05:49.530602226Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:49.533318 env[1227]: time="2024-12-13T02:05:49.533273713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:49.536109 env[1227]: time="2024-12-13T02:05:49.536064473Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:49.536931 env[1227]: time="2024-12-13T02:05:49.536885236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:05:49.562848 env[1227]: time="2024-12-13T02:05:49.562759841Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:05:49.591776 env[1227]: time="2024-12-13T02:05:49.591707619Z" level=info msg="CreateContainer within sandbox \"4826d54af9eaea144408ac6c0f3df5988f619d438bef87ce0ad8186879e5dd08\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e\"" Dec 13 02:05:49.594092 env[1227]: time="2024-12-13T02:05:49.592960759Z" level=info msg="StartContainer for \"df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e\"" Dec 13 02:05:49.619192 systemd[1]: Started cri-containerd-df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e.scope. Dec 13 02:05:49.681866 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:05:49.682051 kernel: audit: type=1400 audit(1734055549.654:1001): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.654000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.654000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fedbe0fae18 items=0 ppid=2579 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:49.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343964646437393632366266383639343961306139663534383966 Dec 13 02:05:49.744206 kernel: audit: type=1300 audit(1734055549.654:1001): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fedbe0fae18 items=0 ppid=2579 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:49.744430 kernel: audit: type=1327 audit(1734055549.654:1001): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343964646437393632366266383639343961306139663534383966 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.768955 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.790164 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.790263 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.811278 env[1227]: time="2024-12-13T02:05:49.811208041Z" level=info msg="StartContainer for \"df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e\" returns successfully" Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.854252 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.854432 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.854475 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.896575 kernel: audit: type=1400 audit(1734055549.655:1002): avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.655000 audit: BPF prog-id=139 op=LOAD Dec 13 02:05:49.655000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00009f3e8 items=0 ppid=2579 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:49.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343964646437393632366266383639343961306139663534383966 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit: BPF prog-id=140 op=LOAD Dec 13 02:05:49.680000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00009f438 items=0 ppid=2579 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:49.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343964646437393632366266383639343961306139663534383966 Dec 13 02:05:49.680000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:05:49.680000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:49.680000 audit: BPF prog-id=141 op=LOAD Dec 13 02:05:49.680000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00009f4c8 items=0 ppid=2579 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:49.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466343964646437393632366266383639343961306139663534383966 Dec 13 02:05:49.968361 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:05:49.968549 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:05:51.313000 audit[3302]: AVC avc: denied { write } for pid=3302 comm="tee" name="fd" dev="proc" ino=24740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.313000 audit[3302]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8cf1c9c4 a2=241 a3=1b6 items=1 ppid=3287 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.313000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:05:51.313000 audit: PATH item=0 name="/dev/fd/63" inode=24731 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.313000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.399000 audit[3325]: AVC avc: denied { write } for pid=3325 comm="tee" name="fd" dev="proc" ino=24761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.399000 audit[3325]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd231209c5 a2=241 a3=1b6 items=1 ppid=3299 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.399000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:05:51.399000 audit: PATH item=0 name="/dev/fd/63" inode=24428 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.399000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.410000 audit[3338]: AVC avc: denied { write } for pid=3338 comm="tee" name="fd" dev="proc" ino=24450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.414000 audit[3327]: AVC avc: denied { write } for pid=3327 comm="tee" name="fd" dev="proc" ino=24452 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.414000 audit[3327]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee30d09c4 a2=241 a3=1b6 items=1 ppid=3291 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.415000 audit[3342]: AVC avc: denied { write } for pid=3342 comm="tee" name="fd" dev="proc" ino=24456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.414000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:05:51.414000 audit: PATH item=0 name="/dev/fd/63" inode=24431 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.414000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.416000 audit[3336]: AVC avc: denied { write } for pid=3336 comm="tee" name="fd" dev="proc" ino=24457 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.410000 audit[3338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0b5799b4 a2=241 a3=1b6 items=1 ppid=3289 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.410000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:05:51.410000 audit: PATH item=0 name="/dev/fd/63" inode=24753 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.416000 audit[3336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd99679c4 a2=241 a3=1b6 items=1 ppid=3284 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.410000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.416000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:05:51.416000 audit: PATH item=0 name="/dev/fd/63" inode=24437 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.416000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.415000 audit[3342]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc1cb19b5 a2=241 a3=1b6 items=1 ppid=3286 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.415000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:05:51.415000 audit: PATH item=0 name="/dev/fd/63" inode=24440 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.428000 audit[3347]: AVC avc: denied { write } for pid=3347 comm="tee" name="fd" dev="proc" ino=24463 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:05:51.428000 audit[3347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddf28a9c6 a2=241 a3=1b6 items=1 ppid=3282 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.428000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:05:51.428000 audit: PATH item=0 name="/dev/fd/63" inode=24447 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:05:51.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.704000 audit: BPF prog-id=142 op=LOAD Dec 13 02:05:51.704000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff77c76b40 a2=98 a3=3 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.704000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.704000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.706000 audit: BPF prog-id=143 op=LOAD Dec 13 02:05:51.706000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff77c76920 a2=74 a3=540051 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.706000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.707000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.707000 audit: BPF prog-id=144 op=LOAD Dec 13 02:05:51.707000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff77c76950 a2=94 a3=2 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.707000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.707000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit: BPF prog-id=145 op=LOAD Dec 13 02:05:51.831000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff77c76810 a2=40 a3=1 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.831000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.831000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:05:51.831000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.831000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff77c768e0 a2=50 a3=7fff77c769c0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.831000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c76820 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff77c76850 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff77c76760 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c76870 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c76850 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c76840 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c76870 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff77c76850 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff77c76870 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff77c76840 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.843000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.843000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff77c768b0 a2=28 a3=0 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.843000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff77c76660 a2=50 a3=1 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.844000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit: BPF prog-id=146 op=LOAD Dec 13 02:05:51.844000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff77c76660 a2=94 a3=5 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.844000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.844000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff77c76710 a2=50 a3=1 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.844000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff77c76830 a2=4 a3=38 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.844000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.844000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:51.844000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff77c76880 a2=94 a3=6 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.844000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:51.845000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff77c76030 a2=94 a3=83 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.845000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff77c76030 a2=94 a3=83 items=0 ppid=3290 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit: BPF prog-id=147 op=LOAD Dec 13 02:05:51.857000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb5f08ab0 a2=98 a3=1999999999999999 items=0 ppid=3290 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.857000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:51.857000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.857000 audit: BPF prog-id=148 op=LOAD Dec 13 02:05:51.857000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb5f08990 a2=74 a3=ffff items=0 ppid=3290 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.857000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:51.857000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { perfmon } for pid=3395 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit[3395]: AVC avc: denied { bpf } for pid=3395 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.858000 audit: BPF prog-id=149 op=LOAD Dec 13 02:05:51.858000 audit[3395]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb5f089d0 a2=40 a3=7ffcb5f08bb0 items=0 ppid=3290 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.858000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:05:51.858000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:05:51.945128 systemd-networkd[1023]: vxlan.calico: Link UP Dec 13 02:05:51.945141 systemd-networkd[1023]: vxlan.calico: Gained carrier Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.991000 audit: BPF prog-id=150 op=LOAD Dec 13 02:05:51.991000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc45095800 a2=98 a3=ffffffff items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.991000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.991000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit: BPF prog-id=151 op=LOAD Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc45095610 a2=74 a3=540051 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit: BPF prog-id=152 op=LOAD Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc45095640 a2=94 a3=2 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc45095510 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc45095540 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc45095450 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc45095560 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc45095540 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc45095530 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc45095560 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc45095540 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc45095560 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc45095530 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc450955a0 a2=28 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.992000 audit: BPF prog-id=153 op=LOAD Dec 13 02:05:51.992000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc45095410 a2=40 a3=0 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:51.992000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:05:51.997000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:51.997000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc45095400 a2=50 a3=2800 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:51.997000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc45095400 a2=50 a3=2800 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.003000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit: BPF prog-id=154 op=LOAD Dec 13 02:05:52.003000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc45094c20 a2=94 a3=2 items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.003000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:52.003000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { perfmon } for pid=3422 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit[3422]: AVC avc: denied { bpf } for pid=3422 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.003000 audit: BPF prog-id=155 op=LOAD Dec 13 02:05:52.003000 audit[3422]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc45094d20 a2=94 a3=2d items=0 ppid=3290 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.003000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit: BPF prog-id=156 op=LOAD Dec 13 02:05:52.019000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe071e5230 a2=98 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.019000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit: BPF prog-id=157 op=LOAD Dec 13 02:05:52.019000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe071e5010 a2=74 a3=540051 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.019000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.019000 audit: BPF prog-id=158 op=LOAD Dec 13 02:05:52.019000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe071e5040 a2=94 a3=2 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.019000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.019000 audit: BPF prog-id=158 op=UNLOAD Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit: BPF prog-id=159 op=LOAD Dec 13 02:05:52.153000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe071e4f00 a2=40 a3=1 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.153000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:05:52.153000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.153000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe071e4fd0 a2=50 a3=7ffe071e50b0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4f10 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe071e4f40 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe071e4e50 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4f60 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4f40 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4f30 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4f60 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe071e4f40 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe071e4f60 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe071e4f30 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe071e4fa0 a2=28 a3=0 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.165000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.165000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe071e4d50 a2=50 a3=1 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.165000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit: BPF prog-id=160 op=LOAD Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe071e4d50 a2=94 a3=5 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe071e4e00 a2=50 a3=1 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe071e4f20 a2=4 a3=38 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe071e4f70 a2=94 a3=6 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { confidentiality } for pid=3429 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe071e4720 a2=94 a3=83 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.166000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe071e4720 a2=94 a3=83 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.166000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.167000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.167000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe071e6160 a2=10 a3=f1f00800 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.167000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.167000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe071e6000 a2=10 a3=3 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.167000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.167000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe071e5fa0 a2=10 a3=3 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.167000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:52.167000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe071e5fa0 a2=10 a3=7 items=0 ppid=3290 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:05:52.173000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:05:52.256000 audit[3451]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:52.256000 audit[3451]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffe7c329e0 a2=0 a3=7fffe7c329cc items=0 ppid=3290 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.256000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:52.285000 audit[3455]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=3455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:52.285000 audit[3455]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff5ceb56a0 a2=0 a3=7fff5ceb568c items=0 ppid=3290 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.285000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:52.288000 audit[3450]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:52.288000 audit[3450]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffee04521a0 a2=0 a3=7ffee045218c items=0 ppid=3290 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:52.289000 audit[3452]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:52.289000 audit[3452]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe0bb20080 a2=0 a3=7ffe0bb2006c items=0 ppid=3290 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:52.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:53.104167 env[1227]: time="2024-12-13T02:05:53.104104121Z" level=info msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" Dec 13 02:05:53.165440 kubelet[2143]: I1213 02:05:53.165370 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gwq9n" podStartSLOduration=5.073441473 podStartE2EDuration="23.165281852s" podCreationTimestamp="2024-12-13 02:05:30 +0000 UTC" firstStartedPulling="2024-12-13 02:05:31.445638338 +0000 UTC m=+22.562413976" lastFinishedPulling="2024-12-13 02:05:49.537478702 +0000 UTC m=+40.654254355" observedRunningTime="2024-12-13 02:05:50.38293995 +0000 UTC m=+41.499715615" watchObservedRunningTime="2024-12-13 02:05:53.165281852 +0000 UTC m=+44.282057786" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.165 [INFO][3477] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.166 [INFO][3477] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" iface="eth0" netns="/var/run/netns/cni-c3a6c044-7d28-f4be-cee3-9403fd384bfb" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.166 [INFO][3477] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" iface="eth0" netns="/var/run/netns/cni-c3a6c044-7d28-f4be-cee3-9403fd384bfb" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.166 [INFO][3477] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" iface="eth0" netns="/var/run/netns/cni-c3a6c044-7d28-f4be-cee3-9403fd384bfb" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.167 [INFO][3477] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.167 [INFO][3477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.193 [INFO][3483] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.193 [INFO][3483] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.193 [INFO][3483] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.202 [WARNING][3483] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.202 [INFO][3483] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.204 [INFO][3483] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:53.208579 env[1227]: 2024-12-13 02:05:53.206 [INFO][3477] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:05:53.213004 systemd[1]: run-netns-cni\x2dc3a6c044\x2d7d28\x2df4be\x2dcee3\x2d9403fd384bfb.mount: Deactivated successfully. Dec 13 02:05:53.215284 env[1227]: time="2024-12-13T02:05:53.215213731Z" level=info msg="TearDown network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" successfully" Dec 13 02:05:53.215418 env[1227]: time="2024-12-13T02:05:53.215283793Z" level=info msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" returns successfully" Dec 13 02:05:53.216545 env[1227]: time="2024-12-13T02:05:53.216489597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-659cf67c9d-s49nw,Uid:71446af3-6b18-4d4d-8adb-dcec326bae05,Namespace:calico-system,Attempt:1,}" Dec 13 02:05:53.367129 systemd-networkd[1023]: cali308bbc4472a: Link UP Dec 13 02:05:53.375862 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:05:53.384855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali308bbc4472a: link becomes ready Dec 13 02:05:53.385592 systemd-networkd[1023]: cali308bbc4472a: Gained carrier Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.281 [INFO][3489] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0 calico-kube-controllers-659cf67c9d- calico-system 71446af3-6b18-4d4d-8adb-dcec326bae05 741 0 2024-12-13 02:05:31 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:659cf67c9d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal calico-kube-controllers-659cf67c9d-s49nw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali308bbc4472a [] []}} ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.281 [INFO][3489] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.318 [INFO][3501] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" HandleID="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.329 [INFO][3501] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" HandleID="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ad00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"calico-kube-controllers-659cf67c9d-s49nw", "timestamp":"2024-12-13 02:05:53.318774482 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.329 [INFO][3501] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.329 [INFO][3501] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.330 [INFO][3501] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.331 [INFO][3501] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.335 [INFO][3501] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.339 [INFO][3501] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.341 [INFO][3501] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.343 [INFO][3501] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.343 [INFO][3501] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.345 [INFO][3501] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05 Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.350 [INFO][3501] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.357 [INFO][3501] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.193/26] block=192.168.13.192/26 handle="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.357 [INFO][3501] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.193/26] handle="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.357 [INFO][3501] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:53.411670 env[1227]: 2024-12-13 02:05:53.358 [INFO][3501] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.193/26] IPv6=[] ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" HandleID="k8s-pod-network.9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.360 [INFO][3489] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0", GenerateName:"calico-kube-controllers-659cf67c9d-", Namespace:"calico-system", SelfLink:"", UID:"71446af3-6b18-4d4d-8adb-dcec326bae05", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"659cf67c9d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-659cf67c9d-s49nw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali308bbc4472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.361 [INFO][3489] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.193/32] ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.361 [INFO][3489] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali308bbc4472a ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.387 [INFO][3489] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.387 [INFO][3489] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0", GenerateName:"calico-kube-controllers-659cf67c9d-", Namespace:"calico-system", SelfLink:"", UID:"71446af3-6b18-4d4d-8adb-dcec326bae05", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"659cf67c9d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05", Pod:"calico-kube-controllers-659cf67c9d-s49nw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali308bbc4472a", MAC:"b6:21:92:98:95:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:53.412945 env[1227]: 2024-12-13 02:05:53.408 [INFO][3489] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05" Namespace="calico-system" Pod="calico-kube-controllers-659cf67c9d-s49nw" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:05:53.435000 audit[3531]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:53.435000 audit[3531]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffccd1461e0 a2=0 a3=7ffccd1461cc items=0 ppid=3290 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.438032 env[1227]: time="2024-12-13T02:05:53.437952120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:53.438227 env[1227]: time="2024-12-13T02:05:53.438054142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:53.438227 env[1227]: time="2024-12-13T02:05:53.438097555Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:53.438392 env[1227]: time="2024-12-13T02:05:53.438341648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05 pid=3532 runtime=io.containerd.runc.v2 Dec 13 02:05:53.435000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:53.475714 systemd[1]: run-containerd-runc-k8s.io-9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05-runc.EOgQ3z.mount: Deactivated successfully. Dec 13 02:05:53.484918 systemd[1]: Started cri-containerd-9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05.scope. Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit: BPF prog-id=161 op=LOAD Dec 13 02:05:53.499000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.499000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3532 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363065313465663835323035623132363738373131353462333336 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3532 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363065313465663835323035623132363738373131353462333336 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit: BPF prog-id=162 op=LOAD Dec 13 02:05:53.500000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094c40 items=0 ppid=3532 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363065313465663835323035623132363738373131353462333336 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit: BPF prog-id=163 op=LOAD Dec 13 02:05:53.500000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094c88 items=0 ppid=3532 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363065313465663835323035623132363738373131353462333336 Dec 13 02:05:53.500000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:05:53.500000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:53.500000 audit: BPF prog-id=164 op=LOAD Dec 13 02:05:53.500000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095098 items=0 ppid=3532 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:53.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363065313465663835323035623132363738373131353462333336 Dec 13 02:05:53.541360 env[1227]: time="2024-12-13T02:05:53.541279045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-659cf67c9d-s49nw,Uid:71446af3-6b18-4d4d-8adb-dcec326bae05,Namespace:calico-system,Attempt:1,} returns sandbox id \"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05\"" Dec 13 02:05:53.546098 env[1227]: time="2024-12-13T02:05:53.545994181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:05:53.820082 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Dec 13 02:05:54.652598 systemd-networkd[1023]: cali308bbc4472a: Gained IPv6LL Dec 13 02:05:55.111895 env[1227]: time="2024-12-13T02:05:55.111799199Z" level=info msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" Dec 13 02:05:55.124529 env[1227]: time="2024-12-13T02:05:55.124299193Z" level=info msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" Dec 13 02:05:55.135403 env[1227]: time="2024-12-13T02:05:55.135349027Z" level=info msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" Dec 13 02:05:55.139680 env[1227]: time="2024-12-13T02:05:55.139249575Z" level=info msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" Dec 13 02:05:55.143955 env[1227]: time="2024-12-13T02:05:55.143887431Z" level=info msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.344 [INFO][3648] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.344 [INFO][3648] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" iface="eth0" netns="/var/run/netns/cni-7c8e1a12-1427-6f1d-51ed-be65a40eed95" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.344 [INFO][3648] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" iface="eth0" netns="/var/run/netns/cni-7c8e1a12-1427-6f1d-51ed-be65a40eed95" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.345 [INFO][3648] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" iface="eth0" netns="/var/run/netns/cni-7c8e1a12-1427-6f1d-51ed-be65a40eed95" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.345 [INFO][3648] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.345 [INFO][3648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.517 [INFO][3673] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.519 [INFO][3673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.520 [INFO][3673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.537 [WARNING][3673] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.537 [INFO][3673] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.542 [INFO][3673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:55.544853 env[1227]: 2024-12-13 02:05:55.543 [INFO][3648] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:05:55.557098 env[1227]: time="2024-12-13T02:05:55.552008808Z" level=info msg="TearDown network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" successfully" Dec 13 02:05:55.557098 env[1227]: time="2024-12-13T02:05:55.552068582Z" level=info msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" returns successfully" Dec 13 02:05:55.557098 env[1227]: time="2024-12-13T02:05:55.552934071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-wbqsn,Uid:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:05:55.555279 systemd[1]: run-netns-cni\x2d7c8e1a12\x2d1427\x2d6f1d\x2d51ed\x2dbe65a40eed95.mount: Deactivated successfully. Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.318 [INFO][3647] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.319 [INFO][3647] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" iface="eth0" netns="/var/run/netns/cni-4b1c2cc2-d09b-a3c4-33a9-fb601ba5c9ad" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.319 [INFO][3647] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" iface="eth0" netns="/var/run/netns/cni-4b1c2cc2-d09b-a3c4-33a9-fb601ba5c9ad" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.320 [INFO][3647] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" iface="eth0" netns="/var/run/netns/cni-4b1c2cc2-d09b-a3c4-33a9-fb601ba5c9ad" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.320 [INFO][3647] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.320 [INFO][3647] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.560 [INFO][3672] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.578 [INFO][3672] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.579 [INFO][3672] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.599 [WARNING][3672] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.599 [INFO][3672] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.609 [INFO][3672] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:55.621293 env[1227]: 2024-12-13 02:05:55.616 [INFO][3647] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:05:55.631511 systemd[1]: run-netns-cni\x2d4b1c2cc2\x2dd09b\x2da3c4\x2d33a9\x2dfb601ba5c9ad.mount: Deactivated successfully. Dec 13 02:05:55.634083 env[1227]: time="2024-12-13T02:05:55.634020463Z" level=info msg="TearDown network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" successfully" Dec 13 02:05:55.635477 env[1227]: time="2024-12-13T02:05:55.635438140Z" level=info msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" returns successfully" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.412 [INFO][3655] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.413 [INFO][3655] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" iface="eth0" netns="/var/run/netns/cni-e6a03969-12ed-c566-f5b3-986ddecb0757" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.413 [INFO][3655] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" iface="eth0" netns="/var/run/netns/cni-e6a03969-12ed-c566-f5b3-986ddecb0757" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.416 [INFO][3655] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" iface="eth0" netns="/var/run/netns/cni-e6a03969-12ed-c566-f5b3-986ddecb0757" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.416 [INFO][3655] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.417 [INFO][3655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.599 [INFO][3685] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.599 [INFO][3685] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.601 [INFO][3685] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.610 [WARNING][3685] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.610 [INFO][3685] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.612 [INFO][3685] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:55.636179 env[1227]: 2024-12-13 02:05:55.634 [INFO][3655] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:05:55.648478 env[1227]: time="2024-12-13T02:05:55.645712006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vmtnj,Uid:34f3f832-181c-4d1c-948b-a208a381b8a6,Namespace:kube-system,Attempt:1,}" Dec 13 02:05:55.645773 systemd[1]: run-netns-cni\x2de6a03969\x2d12ed\x2dc566\x2df5b3\x2d986ddecb0757.mount: Deactivated successfully. Dec 13 02:05:55.660901 env[1227]: time="2024-12-13T02:05:55.660850093Z" level=info msg="TearDown network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" successfully" Dec 13 02:05:55.661231 env[1227]: time="2024-12-13T02:05:55.660902180Z" level=info msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" returns successfully" Dec 13 02:05:55.674949 env[1227]: time="2024-12-13T02:05:55.673114535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rwvv2,Uid:b82d29d9-8869-46f0-8ffd-8fe8e76896a2,Namespace:calico-system,Attempt:1,}" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.454 [INFO][3652] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.455 [INFO][3652] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" iface="eth0" netns="/var/run/netns/cni-1e91e627-dc93-cb87-81b0-3cf05a61ac50" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.457 [INFO][3652] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" iface="eth0" netns="/var/run/netns/cni-1e91e627-dc93-cb87-81b0-3cf05a61ac50" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.457 [INFO][3652] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" iface="eth0" netns="/var/run/netns/cni-1e91e627-dc93-cb87-81b0-3cf05a61ac50" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.457 [INFO][3652] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.457 [INFO][3652] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.630 [INFO][3690] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.632 [INFO][3690] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.632 [INFO][3690] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.661 [WARNING][3690] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.662 [INFO][3690] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.673 [INFO][3690] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:55.682813 env[1227]: 2024-12-13 02:05:55.681 [INFO][3652] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:05:55.691254 env[1227]: time="2024-12-13T02:05:55.683043499Z" level=info msg="TearDown network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" successfully" Dec 13 02:05:55.691254 env[1227]: time="2024-12-13T02:05:55.683091596Z" level=info msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" returns successfully" Dec 13 02:05:55.691254 env[1227]: time="2024-12-13T02:05:55.683905335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-w2dlk,Uid:54a720ca-5b3a-4638-9f1c-52ab3f8d28a8,Namespace:kube-system,Attempt:1,}" Dec 13 02:05:55.688075 systemd[1]: run-netns-cni\x2d1e91e627\x2ddc93\x2dcb87\x2d81b0\x2d3cf05a61ac50.mount: Deactivated successfully. Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.458 [INFO][3642] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.458 [INFO][3642] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" iface="eth0" netns="/var/run/netns/cni-5ed5ad99-47b6-de20-693a-a5a6492e64cf" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.459 [INFO][3642] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" iface="eth0" netns="/var/run/netns/cni-5ed5ad99-47b6-de20-693a-a5a6492e64cf" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.460 [INFO][3642] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" iface="eth0" netns="/var/run/netns/cni-5ed5ad99-47b6-de20-693a-a5a6492e64cf" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.460 [INFO][3642] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.460 [INFO][3642] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.752 [INFO][3691] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.755 [INFO][3691] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.755 [INFO][3691] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.765 [WARNING][3691] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.766 [INFO][3691] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.772 [INFO][3691] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:55.806784 env[1227]: 2024-12-13 02:05:55.796 [INFO][3642] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:05:55.808556 env[1227]: time="2024-12-13T02:05:55.808475177Z" level=info msg="TearDown network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" successfully" Dec 13 02:05:55.808868 env[1227]: time="2024-12-13T02:05:55.808831237Z" level=info msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" returns successfully" Dec 13 02:05:55.831231 env[1227]: time="2024-12-13T02:05:55.831179341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-vlzl9,Uid:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:05:56.096642 systemd-networkd[1023]: cali93ed05a8fef: Link UP Dec 13 02:05:56.109111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:05:56.109783 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali93ed05a8fef: link becomes ready Dec 13 02:05:56.112057 systemd-networkd[1023]: cali93ed05a8fef: Gained carrier Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:55.834 [INFO][3702] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0 calico-apiserver-bb4b6bfdb- calico-apiserver 3a4c48ad-ffa9-4edd-b961-ff7503c17dbf 755 0 2024-12-13 02:05:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:bb4b6bfdb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal calico-apiserver-bb4b6bfdb-wbqsn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali93ed05a8fef [] []}} ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:55.834 [INFO][3702] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.023 [INFO][3758] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" HandleID="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.039 [INFO][3758] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" HandleID="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00044b800), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"calico-apiserver-bb4b6bfdb-wbqsn", "timestamp":"2024-12-13 02:05:56.023795766 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.039 [INFO][3758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.039 [INFO][3758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.039 [INFO][3758] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.052 [INFO][3758] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.059 [INFO][3758] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.064 [INFO][3758] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.067 [INFO][3758] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.070 [INFO][3758] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.070 [INFO][3758] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.072 [INFO][3758] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.077 [INFO][3758] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.086 [INFO][3758] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.194/26] block=192.168.13.192/26 handle="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.086 [INFO][3758] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.194/26] handle="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.087 [INFO][3758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:56.144257 env[1227]: 2024-12-13 02:05:56.087 [INFO][3758] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.194/26] IPv6=[] ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" HandleID="k8s-pod-network.14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.089 [INFO][3702] cni-plugin/k8s.go 386: Populated endpoint ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-bb4b6bfdb-wbqsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93ed05a8fef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.089 [INFO][3702] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.194/32] ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.089 [INFO][3702] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali93ed05a8fef ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.115 [INFO][3702] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.120 [INFO][3702] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c", Pod:"calico-apiserver-bb4b6bfdb-wbqsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93ed05a8fef", MAC:"92:9c:5b:ae:4b:ec", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.145916 env[1227]: 2024-12-13 02:05:56.140 [INFO][3702] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-wbqsn" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:05:56.191723 systemd-networkd[1023]: cali8e741e7cf13: Link UP Dec 13 02:05:56.199960 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8e741e7cf13: link becomes ready Dec 13 02:05:56.201557 systemd-networkd[1023]: cali8e741e7cf13: Gained carrier Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:55.795 [INFO][3718] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0 csi-node-driver- calico-system b82d29d9-8869-46f0-8ffd-8fe8e76896a2 756 0 2024-12-13 02:05:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal csi-node-driver-rwvv2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali8e741e7cf13 [] []}} ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:55.795 [INFO][3718] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.037 [INFO][3746] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" HandleID="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.050 [INFO][3746] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" HandleID="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038ef00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"csi-node-driver-rwvv2", "timestamp":"2024-12-13 02:05:56.037288432 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.051 [INFO][3746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.087 [INFO][3746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.087 [INFO][3746] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.105 [INFO][3746] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.115 [INFO][3746] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.133 [INFO][3746] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.139 [INFO][3746] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.148 [INFO][3746] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.148 [INFO][3746] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.153 [INFO][3746] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191 Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.166 [INFO][3746] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.181 [INFO][3746] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.195/26] block=192.168.13.192/26 handle="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.181 [INFO][3746] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.195/26] handle="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.181 [INFO][3746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:56.246221 env[1227]: 2024-12-13 02:05:56.181 [INFO][3746] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.195/26] IPv6=[] ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" HandleID="k8s-pod-network.1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.183 [INFO][3718] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b82d29d9-8869-46f0-8ffd-8fe8e76896a2", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-rwvv2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8e741e7cf13", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.184 [INFO][3718] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.195/32] ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.184 [INFO][3718] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8e741e7cf13 ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.202 [INFO][3718] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.209 [INFO][3718] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b82d29d9-8869-46f0-8ffd-8fe8e76896a2", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191", Pod:"csi-node-driver-rwvv2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8e741e7cf13", MAC:"a6:88:4c:a9:b8:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.247423 env[1227]: 2024-12-13 02:05:56.232 [INFO][3718] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191" Namespace="calico-system" Pod="csi-node-driver-rwvv2" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:05:56.268000 audit[3803]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.275127 kernel: kauditd_printk_skb: 620 callbacks suppressed Dec 13 02:05:56.275266 kernel: audit: type=1325 audit(1734055556.268:1128): table=filter:102 family=2 entries=44 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.268000 audit[3803]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffee219aa80 a2=0 a3=7ffee219aa6c items=0 ppid=3290 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.331847 kernel: audit: type=1300 audit(1734055556.268:1128): arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffee219aa80 a2=0 a3=7ffee219aa6c items=0 ppid=3290 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.268000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.353923 kernel: audit: type=1327 audit(1734055556.268:1128): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.368988 env[1227]: time="2024-12-13T02:05:56.361346572Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:56.368988 env[1227]: time="2024-12-13T02:05:56.363475197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:56.368988 env[1227]: time="2024-12-13T02:05:56.363552757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:56.368988 env[1227]: time="2024-12-13T02:05:56.363887290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c pid=3827 runtime=io.containerd.runc.v2 Dec 13 02:05:56.447917 systemd-networkd[1023]: cali6ff7119b2cc: Link UP Dec 13 02:05:56.455013 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ff7119b2cc: link becomes ready Dec 13 02:05:56.457126 systemd-networkd[1023]: cali6ff7119b2cc: Gained carrier Dec 13 02:05:56.460000 audit[3852]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.478922 kernel: audit: type=1325 audit(1734055556.460:1129): table=filter:103 family=2 entries=38 op=nft_register_chain pid=3852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.460000 audit[3852]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7fffbb9fc8b0 a2=0 a3=7fffbb9fc89c items=0 ppid=3290 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.507255 env[1227]: time="2024-12-13T02:05:56.507001586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:56.507255 env[1227]: time="2024-12-13T02:05:56.507060229Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:56.507255 env[1227]: time="2024-12-13T02:05:56.507079829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:56.507967 env[1227]: time="2024-12-13T02:05:56.507873879Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191 pid=3849 runtime=io.containerd.runc.v2 Dec 13 02:05:56.528646 kernel: audit: type=1300 audit(1734055556.460:1129): arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7fffbb9fc8b0 a2=0 a3=7fffbb9fc89c items=0 ppid=3290 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.523534 systemd[1]: Started cri-containerd-14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c.scope. Dec 13 02:05:56.460000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.555826 kernel: audit: type=1327 audit(1734055556.460:1129): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:55.962 [INFO][3734] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0 coredns-76f75df574- kube-system 34f3f832-181c-4d1c-948b-a208a381b8a6 754 0 2024-12-13 02:05:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal coredns-76f75df574-vmtnj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6ff7119b2cc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:55.963 [INFO][3734] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.255 [INFO][3777] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" HandleID="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.337 [INFO][3777] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" HandleID="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00040b6f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"coredns-76f75df574-vmtnj", "timestamp":"2024-12-13 02:05:56.25506187 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.338 [INFO][3777] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.338 [INFO][3777] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.338 [INFO][3777] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.362 [INFO][3777] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.381 [INFO][3777] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.401 [INFO][3777] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.406 [INFO][3777] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.410 [INFO][3777] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.410 [INFO][3777] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.414 [INFO][3777] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611 Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.421 [INFO][3777] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.433 [INFO][3777] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.196/26] block=192.168.13.192/26 handle="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.433 [INFO][3777] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.196/26] handle="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.433 [INFO][3777] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:56.565063 env[1227]: 2024-12-13 02:05:56.433 [INFO][3777] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.196/26] IPv6=[] ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" HandleID="k8s-pod-network.bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.439 [INFO][3734] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"34f3f832-181c-4d1c-948b-a208a381b8a6", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-vmtnj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6ff7119b2cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.439 [INFO][3734] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.196/32] ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.439 [INFO][3734] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6ff7119b2cc ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.456 [INFO][3734] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.462 [INFO][3734] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"34f3f832-181c-4d1c-948b-a208a381b8a6", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611", Pod:"coredns-76f75df574-vmtnj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6ff7119b2cc", MAC:"1e:fc:ac:ed:10:78", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.566333 env[1227]: 2024-12-13 02:05:56.529 [INFO][3734] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611" Namespace="kube-system" Pod="coredns-76f75df574-vmtnj" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:05:56.585334 systemd[1]: run-netns-cni\x2d5ed5ad99\x2d47b6\x2dde20\x2d693a\x2da5a6492e64cf.mount: Deactivated successfully. Dec 13 02:05:56.642189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d254311116: link becomes ready Dec 13 02:05:56.628941 systemd-networkd[1023]: cali4d254311116: Link UP Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669182 kernel: audit: type=1400 audit(1734055556.645:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.667199 systemd-networkd[1023]: cali4d254311116: Gained carrier Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.720845 kernel: audit: type=1400 audit(1734055556.645:1131): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.005 [INFO][3747] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0 coredns-76f75df574- kube-system 54a720ca-5b3a-4638-9f1c-52ab3f8d28a8 758 0 2024-12-13 02:05:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal coredns-76f75df574-w2dlk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4d254311116 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.005 [INFO][3747] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.382 [INFO][3787] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" HandleID="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.414 [INFO][3787] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" HandleID="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00039d150), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"coredns-76f75df574-w2dlk", "timestamp":"2024-12-13 02:05:56.382508202 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.414 [INFO][3787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.433 [INFO][3787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.434 [INFO][3787] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.436 [INFO][3787] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.445 [INFO][3787] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.485 [INFO][3787] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.537 [INFO][3787] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.545 [INFO][3787] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.546 [INFO][3787] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.553 [INFO][3787] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175 Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.568 [INFO][3787] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.596 [INFO][3787] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.197/26] block=192.168.13.192/26 handle="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.596 [INFO][3787] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.197/26] handle="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.596 [INFO][3787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:56.742366 env[1227]: 2024-12-13 02:05:56.596 [INFO][3787] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.197/26] IPv6=[] ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" HandleID="k8s-pod-network.9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.746260 kernel: audit: type=1400 audit(1734055556.645:1132): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.608 [INFO][3747] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-w2dlk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d254311116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.608 [INFO][3747] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.197/32] ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.608 [INFO][3747] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4d254311116 ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.630 [INFO][3747] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.671 [INFO][3747] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175", Pod:"coredns-76f75df574-w2dlk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d254311116", MAC:"16:17:6b:3a:8c:cd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.746321 env[1227]: 2024-12-13 02:05:56.690 [INFO][3747] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175" Namespace="kube-system" Pod="coredns-76f75df574-w2dlk" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.746543 systemd[1]: Started cri-containerd-1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191.scope. Dec 13 02:05:56.770119 kernel: audit: type=1400 audit(1734055556.645:1133): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.666000 audit: BPF prog-id=165 op=LOAD Dec 13 02:05:56.668000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.668000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3827 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393039613831333066303462363732383938633862343662333564 Dec 13 02:05:56.668000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.668000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3827 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393039613831333066303462363732383938633862343662333564 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit: BPF prog-id=166 op=LOAD Dec 13 02:05:56.669000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a11e0 items=0 ppid=3827 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393039613831333066303462363732383938633862343662333564 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit: BPF prog-id=167 op=LOAD Dec 13 02:05:56.669000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1228 items=0 ppid=3827 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393039613831333066303462363732383938633862343662333564 Dec 13 02:05:56.669000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:05:56.669000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.669000 audit: BPF prog-id=168 op=LOAD Dec 13 02:05:56.669000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1638 items=0 ppid=3827 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393039613831333066303462363732383938633862343662333564 Dec 13 02:05:56.763000 audit[3899]: NETFILTER_CFG table=filter:104 family=2 entries=46 op=nft_register_chain pid=3899 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.763000 audit[3899]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffdc1db2ce0 a2=0 a3=7ffdc1db2ccc items=0 ppid=3290 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.763000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.794000 audit: BPF prog-id=169 op=LOAD Dec 13 02:05:56.795000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.795000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3849 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161353561643161646433333666316534336364396365306663616165 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3849 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161353561643161646433333666316534336364396365306663616165 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.796000 audit: BPF prog-id=170 op=LOAD Dec 13 02:05:56.796000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000416030 items=0 ppid=3849 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161353561643161646433333666316534336364396365306663616165 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.798000 audit: BPF prog-id=171 op=LOAD Dec 13 02:05:56.798000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000416078 items=0 ppid=3849 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161353561643161646433333666316534336364396365306663616165 Dec 13 02:05:56.799000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:05:56.799000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:56.800000 audit: BPF prog-id=172 op=LOAD Dec 13 02:05:56.800000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000416488 items=0 ppid=3849 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161353561643161646433333666316534336364396365306663616165 Dec 13 02:05:56.824837 env[1227]: time="2024-12-13T02:05:56.821585672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:56.824837 env[1227]: time="2024-12-13T02:05:56.821640277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:56.824837 env[1227]: time="2024-12-13T02:05:56.821661400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:56.824837 env[1227]: time="2024-12-13T02:05:56.821917303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175 pid=3934 runtime=io.containerd.runc.v2 Dec 13 02:05:56.848678 env[1227]: time="2024-12-13T02:05:56.848572966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:56.849027 env[1227]: time="2024-12-13T02:05:56.848966127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:56.849252 env[1227]: time="2024-12-13T02:05:56.849200254Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:56.849842 env[1227]: time="2024-12-13T02:05:56.849726513Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611 pid=3947 runtime=io.containerd.runc.v2 Dec 13 02:05:56.898000 audit[3969]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:56.898000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7fff1c642070 a2=0 a3=7fff1c64205c items=0 ppid=3290 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:56.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:56.908122 systemd-networkd[1023]: calie4b60ed86c4: Link UP Dec 13 02:05:56.928851 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie4b60ed86c4: link becomes ready Dec 13 02:05:56.929389 systemd-networkd[1023]: calie4b60ed86c4: Gained carrier Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.187 [INFO][3766] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0 calico-apiserver-bb4b6bfdb- calico-apiserver cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6 757 0 2024-12-13 02:05:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:bb4b6bfdb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal calico-apiserver-bb4b6bfdb-vlzl9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie4b60ed86c4 [] []}} ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.187 [INFO][3766] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.712 [INFO][3804] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" HandleID="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.775 [INFO][3804] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" HandleID="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003814f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", "pod":"calico-apiserver-bb4b6bfdb-vlzl9", "timestamp":"2024-12-13 02:05:56.712362139 +0000 UTC"}, Hostname:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.775 [INFO][3804] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.775 [INFO][3804] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.775 [INFO][3804] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal' Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.779 [INFO][3804] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.805 [INFO][3804] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.823 [INFO][3804] ipam/ipam.go 489: Trying affinity for 192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.830 [INFO][3804] ipam/ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.836 [INFO][3804] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.836 [INFO][3804] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.842 [INFO][3804] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.854 [INFO][3804] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.874 [INFO][3804] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.13.198/26] block=192.168.13.192/26 handle="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.874 [INFO][3804] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.198/26] handle="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" host="ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal" Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.874 [INFO][3804] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:05:56.958646 env[1227]: 2024-12-13 02:05:56.874 [INFO][3804] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.13.198/26] IPv6=[] ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" HandleID="k8s-pod-network.36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.880 [INFO][3766] cni-plugin/k8s.go 386: Populated endpoint ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-bb4b6bfdb-vlzl9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie4b60ed86c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.880 [INFO][3766] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.13.198/32] ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.880 [INFO][3766] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie4b60ed86c4 ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.931 [INFO][3766] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.931 [INFO][3766] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f", Pod:"calico-apiserver-bb4b6bfdb-vlzl9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie4b60ed86c4", MAC:"72:10:2d:41:8a:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:05:56.959988 env[1227]: 2024-12-13 02:05:56.956 [INFO][3766] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f" Namespace="calico-apiserver" Pod="calico-apiserver-bb4b6bfdb-vlzl9" WorkloadEndpoint="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:05:56.994709 systemd[1]: Started cri-containerd-9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175.scope. Dec 13 02:05:56.997606 env[1227]: time="2024-12-13T02:05:56.997540239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rwvv2,Uid:b82d29d9-8869-46f0-8ffd-8fe8e76896a2,Namespace:calico-system,Attempt:1,} returns sandbox id \"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191\"" Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.022000 audit: BPF prog-id=173 op=LOAD Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3934 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653335306539323137646363633635336433383133626338363734 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3934 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653335306539323137646363633635336433383133626338363734 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit: BPF prog-id=174 op=LOAD Dec 13 02:05:57.023000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000301050 items=0 ppid=3934 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653335306539323137646363633635336433383133626338363734 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit: BPF prog-id=175 op=LOAD Dec 13 02:05:57.023000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000301098 items=0 ppid=3934 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653335306539323137646363633635336433383133626338363734 Dec 13 02:05:57.023000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:05:57.023000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { perfmon } for pid=3952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit[3952]: AVC avc: denied { bpf } for pid=3952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.023000 audit: BPF prog-id=176 op=LOAD Dec 13 02:05:57.023000 audit[3952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003014a8 items=0 ppid=3934 pid=3952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653335306539323137646363633635336433383133626338363734 Dec 13 02:05:57.058978 systemd[1]: Started cri-containerd-bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611.scope. Dec 13 02:05:57.085676 env[1227]: time="2024-12-13T02:05:57.085616128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-wbqsn,Uid:3a4c48ad-ffa9-4edd-b961-ff7503c17dbf,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c\"" Dec 13 02:05:57.093552 env[1227]: time="2024-12-13T02:05:57.093464290Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:05:57.093770 env[1227]: time="2024-12-13T02:05:57.093569361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:05:57.093770 env[1227]: time="2024-12-13T02:05:57.093611580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:05:57.093945 env[1227]: time="2024-12-13T02:05:57.093827327Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f pid=4017 runtime=io.containerd.runc.v2 Dec 13 02:05:57.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.124000 audit: BPF prog-id=177 op=LOAD Dec 13 02:05:57.126000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.126000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3947 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646264373338313464623565316236616364396539626634313565 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3947 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646264373338313464623565316236616364396539626634313565 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.129000 audit: BPF prog-id=178 op=LOAD Dec 13 02:05:57.129000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0530 items=0 ppid=3947 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646264373338313464623565316236616364396539626634313565 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.131000 audit: BPF prog-id=179 op=LOAD Dec 13 02:05:57.131000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0578 items=0 ppid=3947 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646264373338313464623565316236616364396539626634313565 Dec 13 02:05:57.132000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:05:57.132000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { perfmon } for pid=3966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit[3966]: AVC avc: denied { bpf } for pid=3966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.132000 audit: BPF prog-id=180 op=LOAD Dec 13 02:05:57.132000 audit[3966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0988 items=0 ppid=3947 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646264373338313464623565316236616364396539626634313565 Dec 13 02:05:57.141000 audit[4040]: NETFILTER_CFG table=filter:106 family=2 entries=50 op=nft_register_chain pid=4040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:05:57.141000 audit[4040]: SYSCALL arch=c000003e syscall=46 success=yes exit=25080 a0=3 a1=7fff7fb83410 a2=0 a3=7fff7fb833fc items=0 ppid=3290 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:05:57.179943 env[1227]: time="2024-12-13T02:05:57.179744980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-w2dlk,Uid:54a720ca-5b3a-4638-9f1c-52ab3f8d28a8,Namespace:kube-system,Attempt:1,} returns sandbox id \"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175\"" Dec 13 02:05:57.189156 systemd[1]: Started cri-containerd-36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f.scope. Dec 13 02:05:57.198155 env[1227]: time="2024-12-13T02:05:57.198109338Z" level=info msg="CreateContainer within sandbox \"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:05:57.237846 env[1227]: time="2024-12-13T02:05:57.237768601Z" level=info msg="CreateContainer within sandbox \"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e6c47c645a9aafdc73ab18d033106d7d075225734e6ba326feefef7f54585d0d\"" Dec 13 02:05:57.240743 env[1227]: time="2024-12-13T02:05:57.240682596Z" level=info msg="StartContainer for \"e6c47c645a9aafdc73ab18d033106d7d075225734e6ba326feefef7f54585d0d\"" Dec 13 02:05:57.269322 env[1227]: time="2024-12-13T02:05:57.269271370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-vmtnj,Uid:34f3f832-181c-4d1c-948b-a208a381b8a6,Namespace:kube-system,Attempt:1,} returns sandbox id \"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611\"" Dec 13 02:05:57.275744 env[1227]: time="2024-12-13T02:05:57.275696490Z" level=info msg="CreateContainer within sandbox \"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.285000 audit: BPF prog-id=181 op=LOAD Dec 13 02:05:57.290000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.290000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4017 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336633761353236633965353935653137353936366165386534353634 Dec 13 02:05:57.290000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.290000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4017 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336633761353236633965353935653137353936366165386534353634 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.291000 audit: BPF prog-id=182 op=LOAD Dec 13 02:05:57.291000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000349cd0 items=0 ppid=4017 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336633761353236633965353935653137353936366165386534353634 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.292000 audit: BPF prog-id=183 op=LOAD Dec 13 02:05:57.292000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000349d18 items=0 ppid=4017 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336633761353236633965353935653137353936366165386534353634 Dec 13 02:05:57.295000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:05:57.295000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.295000 audit: BPF prog-id=184 op=LOAD Dec 13 02:05:57.295000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d2128 items=0 ppid=4017 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336633761353236633965353935653137353936366165386534353634 Dec 13 02:05:57.306581 systemd[1]: Started cri-containerd-e6c47c645a9aafdc73ab18d033106d7d075225734e6ba326feefef7f54585d0d.scope. Dec 13 02:05:57.322218 env[1227]: time="2024-12-13T02:05:57.322162887Z" level=info msg="CreateContainer within sandbox \"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4c1cac7e69675e2a103a395a238a5b0e56a3b191cfceb871a6285da064855534\"" Dec 13 02:05:57.323757 env[1227]: time="2024-12-13T02:05:57.323718280Z" level=info msg="StartContainer for \"4c1cac7e69675e2a103a395a238a5b0e56a3b191cfceb871a6285da064855534\"" Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.341000 audit: BPF prog-id=185 op=LOAD Dec 13 02:05:57.343000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.343000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3934 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633437633634356139616166646337336162313864303333313036 Dec 13 02:05:57.343000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.343000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3934 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633437633634356139616166646337336162313864303333313036 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.344000 audit: BPF prog-id=186 op=LOAD Dec 13 02:05:57.344000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000333340 items=0 ppid=3934 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633437633634356139616166646337336162313864303333313036 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.345000 audit: BPF prog-id=187 op=LOAD Dec 13 02:05:57.345000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000333388 items=0 ppid=3934 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633437633634356139616166646337336162313864303333313036 Dec 13 02:05:57.346000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:05:57.346000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.346000 audit: BPF prog-id=188 op=LOAD Dec 13 02:05:57.346000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000333798 items=0 ppid=3934 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536633437633634356139616166646337336162313864303333313036 Dec 13 02:05:57.372743 systemd[1]: Started cri-containerd-4c1cac7e69675e2a103a395a238a5b0e56a3b191cfceb871a6285da064855534.scope. Dec 13 02:05:57.439039 env[1227]: time="2024-12-13T02:05:57.434860995Z" level=info msg="StartContainer for \"e6c47c645a9aafdc73ab18d033106d7d075225734e6ba326feefef7f54585d0d\" returns successfully" Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.444000 audit: BPF prog-id=189 op=LOAD Dec 13 02:05:57.445000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.445000 audit[4107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463316361633765363936373565326131303361333935613233386135 Dec 13 02:05:57.448000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.448000 audit[4107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463316361633765363936373565326131303361333935613233386135 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.449000 audit: BPF prog-id=190 op=LOAD Dec 13 02:05:57.449000 audit[4107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003acc20 items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463316361633765363936373565326131303361333935613233386135 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.450000 audit: BPF prog-id=191 op=LOAD Dec 13 02:05:57.450000 audit[4107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003acc68 items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463316361633765363936373565326131303361333935613233386135 Dec 13 02:05:57.451000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:05:57.452000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { perfmon } for pid=4107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit[4107]: AVC avc: denied { bpf } for pid=4107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.452000 audit: BPF prog-id=192 op=LOAD Dec 13 02:05:57.452000 audit[4107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ad078 items=0 ppid=3947 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463316361633765363936373565326131303361333935613233386135 Dec 13 02:05:57.496420 env[1227]: time="2024-12-13T02:05:57.496342253Z" level=info msg="StartContainer for \"4c1cac7e69675e2a103a395a238a5b0e56a3b191cfceb871a6285da064855534\" returns successfully" Dec 13 02:05:57.532038 systemd-networkd[1023]: cali93ed05a8fef: Gained IPv6LL Dec 13 02:05:57.572961 systemd[1]: run-containerd-runc-k8s.io-9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175-runc.64BR4b.mount: Deactivated successfully. Dec 13 02:05:57.660001 systemd-networkd[1023]: cali8e741e7cf13: Gained IPv6LL Dec 13 02:05:57.674545 env[1227]: time="2024-12-13T02:05:57.674489524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb4b6bfdb-vlzl9,Uid:cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f\"" Dec 13 02:05:57.694494 env[1227]: time="2024-12-13T02:05:57.694338528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:57.699265 env[1227]: time="2024-12-13T02:05:57.699224013Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:57.701901 env[1227]: time="2024-12-13T02:05:57.701864991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:57.704365 env[1227]: time="2024-12-13T02:05:57.704325068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:57.705506 env[1227]: time="2024-12-13T02:05:57.705452945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:05:57.712145 env[1227]: time="2024-12-13T02:05:57.712109696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:05:57.730929 env[1227]: time="2024-12-13T02:05:57.730862649Z" level=info msg="CreateContainer within sandbox \"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:05:57.756751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount812014079.mount: Deactivated successfully. Dec 13 02:05:57.761894 env[1227]: time="2024-12-13T02:05:57.761837785Z" level=info msg="CreateContainer within sandbox \"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2\"" Dec 13 02:05:57.762837 env[1227]: time="2024-12-13T02:05:57.762783444Z" level=info msg="StartContainer for \"c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2\"" Dec 13 02:05:57.789317 systemd[1]: Started cri-containerd-c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2.scope. Dec 13 02:05:57.790875 systemd-networkd[1023]: cali4d254311116: Gained IPv6LL Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.813000 audit: BPF prog-id=193 op=LOAD Dec 13 02:05:57.814000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.814000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3532 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326538376332353161306134373034616638356666343333386362 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3532 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326538376332353161306134373034616638356666343333386362 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit: BPF prog-id=194 op=LOAD Dec 13 02:05:57.815000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c0b60 items=0 ppid=3532 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326538376332353161306134373034616638356666343333386362 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit: BPF prog-id=195 op=LOAD Dec 13 02:05:57.815000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c0ba8 items=0 ppid=3532 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326538376332353161306134373034616638356666343333386362 Dec 13 02:05:57.815000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:05:57.815000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:57.815000 audit: BPF prog-id=196 op=LOAD Dec 13 02:05:57.815000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c0fb8 items=0 ppid=3532 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:57.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326538376332353161306134373034616638356666343333386362 Dec 13 02:05:57.856747 env[1227]: time="2024-12-13T02:05:57.856668774Z" level=info msg="StartContainer for \"c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2\" returns successfully" Dec 13 02:05:58.108567 systemd-networkd[1023]: calie4b60ed86c4: Gained IPv6LL Dec 13 02:05:58.364972 systemd-networkd[1023]: cali6ff7119b2cc: Gained IPv6LL Dec 13 02:05:58.474614 kubelet[2143]: I1213 02:05:58.474577 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-659cf67c9d-s49nw" podStartSLOduration=23.310883233 podStartE2EDuration="27.474501031s" podCreationTimestamp="2024-12-13 02:05:31 +0000 UTC" firstStartedPulling="2024-12-13 02:05:53.543116614 +0000 UTC m=+44.659892256" lastFinishedPulling="2024-12-13 02:05:57.706734401 +0000 UTC m=+48.823510054" observedRunningTime="2024-12-13 02:05:58.452114482 +0000 UTC m=+49.568890149" watchObservedRunningTime="2024-12-13 02:05:58.474501031 +0000 UTC m=+49.591276696" Dec 13 02:05:58.501308 kubelet[2143]: I1213 02:05:58.501267 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-w2dlk" podStartSLOduration=34.501208754 podStartE2EDuration="34.501208754s" podCreationTimestamp="2024-12-13 02:05:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:58.477428829 +0000 UTC m=+49.594204495" watchObservedRunningTime="2024-12-13 02:05:58.501208754 +0000 UTC m=+49.617984434" Dec 13 02:05:58.528000 audit[4206]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:58.528000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc6f0fde60 a2=0 a3=7ffc6f0fde4c items=0 ppid=2314 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:58.547000 audit[4206]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:58.547000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc6f0fde60 a2=0 a3=7ffc6f0fde4c items=0 ppid=2314 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:58.635340 kubelet[2143]: I1213 02:05:58.635228 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-vmtnj" podStartSLOduration=34.635171724 podStartE2EDuration="34.635171724s" podCreationTimestamp="2024-12-13 02:05:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:05:58.50300704 +0000 UTC m=+49.619782704" watchObservedRunningTime="2024-12-13 02:05:58.635171724 +0000 UTC m=+49.751947389" Dec 13 02:05:58.822311 env[1227]: time="2024-12-13T02:05:58.822240677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.825106 env[1227]: time="2024-12-13T02:05:58.825058820Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.827451 env[1227]: time="2024-12-13T02:05:58.827386843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.829549 env[1227]: time="2024-12-13T02:05:58.829496990Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:05:58.830572 env[1227]: time="2024-12-13T02:05:58.830526558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:05:58.832140 env[1227]: time="2024-12-13T02:05:58.831423997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:05:58.836099 env[1227]: time="2024-12-13T02:05:58.836060291Z" level=info msg="CreateContainer within sandbox \"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:05:58.869680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3688952588.mount: Deactivated successfully. Dec 13 02:05:58.875529 env[1227]: time="2024-12-13T02:05:58.875456926Z" level=info msg="CreateContainer within sandbox \"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f5ac6b4e26df5d4aed05bbac369e52397ffae1cdc3d6ed2629c2ac7897bdbee0\"" Dec 13 02:05:58.878006 env[1227]: time="2024-12-13T02:05:58.877963860Z" level=info msg="StartContainer for \"f5ac6b4e26df5d4aed05bbac369e52397ffae1cdc3d6ed2629c2ac7897bdbee0\"" Dec 13 02:05:58.921470 systemd[1]: Started cri-containerd-f5ac6b4e26df5d4aed05bbac369e52397ffae1cdc3d6ed2629c2ac7897bdbee0.scope. Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f5801882dc8 items=0 ppid=3849 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616336623465323664663564346165643035626261633336396535 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit: BPF prog-id=197 op=LOAD Dec 13 02:05:58.943000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00026dee8 items=0 ppid=3849 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616336623465323664663564346165643035626261633336396535 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit: BPF prog-id=198 op=LOAD Dec 13 02:05:58.943000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00026df38 items=0 ppid=3849 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616336623465323664663564346165643035626261633336396535 Dec 13 02:05:58.943000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:05:58.943000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:05:58.943000 audit: BPF prog-id=199 op=LOAD Dec 13 02:05:58.943000 audit[4223]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00026dfc8 items=0 ppid=3849 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:58.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635616336623465323664663564346165643035626261633336396535 Dec 13 02:05:58.968438 env[1227]: time="2024-12-13T02:05:58.968382335Z" level=info msg="StartContainer for \"f5ac6b4e26df5d4aed05bbac369e52397ffae1cdc3d6ed2629c2ac7897bdbee0\" returns successfully" Dec 13 02:05:59.522000 audit[4255]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:59.522000 audit[4255]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc02155180 a2=0 a3=7ffc0215516c items=0 ppid=2314 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:59.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:05:59.537000 audit[4255]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:05:59.537000 audit[4255]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc02155180 a2=0 a3=7ffc0215516c items=0 ppid=2314 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:05:59.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:00.810249 kubelet[2143]: I1213 02:06:00.810201 2143 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:00.873364 systemd[1]: run-containerd-runc-k8s.io-df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e-runc.Z0PM0T.mount: Deactivated successfully. Dec 13 02:06:01.042538 systemd[1]: run-containerd-runc-k8s.io-df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e-runc.DE4uqd.mount: Deactivated successfully. Dec 13 02:06:01.330082 env[1227]: time="2024-12-13T02:06:01.330029821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.332764 env[1227]: time="2024-12-13T02:06:01.332698488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.335394 env[1227]: time="2024-12-13T02:06:01.335357008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.337857 env[1227]: time="2024-12-13T02:06:01.337792773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.339093 env[1227]: time="2024-12-13T02:06:01.339051557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:06:01.340715 env[1227]: time="2024-12-13T02:06:01.340662987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:06:01.348050 env[1227]: time="2024-12-13T02:06:01.347982148Z" level=info msg="CreateContainer within sandbox \"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:06:01.375589 env[1227]: time="2024-12-13T02:06:01.375525058Z" level=info msg="CreateContainer within sandbox \"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cd4c75e3a9e9c72d5f35225e8392e3c89dbbf53e79ecea48c6ae706fedacdb61\"" Dec 13 02:06:01.376523 env[1227]: time="2024-12-13T02:06:01.376478091Z" level=info msg="StartContainer for \"cd4c75e3a9e9c72d5f35225e8392e3c89dbbf53e79ecea48c6ae706fedacdb61\"" Dec 13 02:06:01.413303 systemd[1]: Started cri-containerd-cd4c75e3a9e9c72d5f35225e8392e3c89dbbf53e79ecea48c6ae706fedacdb61.scope. Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.491842 kernel: kauditd_printk_skb: 516 callbacks suppressed Dec 13 02:06:01.491910 kernel: audit: type=1400 audit(1734055561.484:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.568644 kernel: audit: type=1400 audit(1734055561.484:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.568798 kernel: audit: type=1400 audit(1734055561.484:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.591880 kernel: audit: type=1400 audit(1734055561.484:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.598972 kernel: audit: type=1400 audit(1734055561.484:1291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.643873 kernel: audit: type=1400 audit(1734055561.484:1292): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.673871 kernel: audit: type=1400 audit(1734055561.484:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.695913 kernel: audit: type=1400 audit(1734055561.484:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.696049 kernel: audit: type=1400 audit(1734055561.484:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.510000 audit: BPF prog-id=200 op=LOAD Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3827 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364346337356533613965396337326435663335323235653833393265 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3827 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.738884 kernel: audit: type=1400 audit(1734055561.510:1296): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364346337356533613965396337326435663335323235653833393265 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.511000 audit: BPF prog-id=201 op=LOAD Dec 13 02:06:01.511000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cea00 items=0 ppid=3827 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364346337356533613965396337326435663335323235653833393265 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit: BPF prog-id=202 op=LOAD Dec 13 02:06:01.512000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cea48 items=0 ppid=3827 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364346337356533613965396337326435663335323235653833393265 Dec 13 02:06:01.512000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:06:01.512000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.512000 audit: BPF prog-id=203 op=LOAD Dec 13 02:06:01.512000 audit[4308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cee58 items=0 ppid=3827 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364346337356533613965396337326435663335323235653833393265 Dec 13 02:06:01.741969 env[1227]: time="2024-12-13T02:06:01.741913811Z" level=info msg="StartContainer for \"cd4c75e3a9e9c72d5f35225e8392e3c89dbbf53e79ecea48c6ae706fedacdb61\" returns successfully" Dec 13 02:06:01.779836 env[1227]: time="2024-12-13T02:06:01.776226342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.780170 env[1227]: time="2024-12-13T02:06:01.780114246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.784036 env[1227]: time="2024-12-13T02:06:01.783989886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.787496 env[1227]: time="2024-12-13T02:06:01.787450729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:01.788439 env[1227]: time="2024-12-13T02:06:01.788381874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:06:01.791106 env[1227]: time="2024-12-13T02:06:01.791073479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:06:01.792622 env[1227]: time="2024-12-13T02:06:01.792586975Z" level=info msg="CreateContainer within sandbox \"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:06:01.810886 env[1227]: time="2024-12-13T02:06:01.810836248Z" level=info msg="CreateContainer within sandbox \"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c654e78d013058d89ac2b7280c973e419261d0b936132bce79ecafdb9cd674c9\"" Dec 13 02:06:01.811932 env[1227]: time="2024-12-13T02:06:01.811897781Z" level=info msg="StartContainer for \"c654e78d013058d89ac2b7280c973e419261d0b936132bce79ecafdb9cd674c9\"" Dec 13 02:06:01.838869 systemd[1]: Started cri-containerd-c654e78d013058d89ac2b7280c973e419261d0b936132bce79ecafdb9cd674c9.scope. Dec 13 02:06:01.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.885000 audit: BPF prog-id=204 op=LOAD Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4017 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353465373864303133303538643839616332623732383063393733 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4017 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353465373864303133303538643839616332623732383063393733 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.886000 audit: BPF prog-id=205 op=LOAD Dec 13 02:06:01.886000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aaa50 items=0 ppid=4017 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353465373864303133303538643839616332623732383063393733 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit: BPF prog-id=206 op=LOAD Dec 13 02:06:01.887000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aaa98 items=0 ppid=4017 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353465373864303133303538643839616332623732383063393733 Dec 13 02:06:01.887000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:06:01.887000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { perfmon } for pid=4347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit[4347]: AVC avc: denied { bpf } for pid=4347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:01.887000 audit: BPF prog-id=207 op=LOAD Dec 13 02:06:01.887000 audit[4347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aaea8 items=0 ppid=4017 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:01.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353465373864303133303538643839616332623732383063393733 Dec 13 02:06:01.955662 env[1227]: time="2024-12-13T02:06:01.955600794Z" level=info msg="StartContainer for \"c654e78d013058d89ac2b7280c973e419261d0b936132bce79ecafdb9cd674c9\" returns successfully" Dec 13 02:06:02.530518 kubelet[2143]: I1213 02:06:02.530465 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-wbqsn" podStartSLOduration=28.27871604 podStartE2EDuration="32.530398339s" podCreationTimestamp="2024-12-13 02:05:30 +0000 UTC" firstStartedPulling="2024-12-13 02:05:57.087875149 +0000 UTC m=+48.204650804" lastFinishedPulling="2024-12-13 02:06:01.339557453 +0000 UTC m=+52.456333103" observedRunningTime="2024-12-13 02:06:02.508123768 +0000 UTC m=+53.624899443" watchObservedRunningTime="2024-12-13 02:06:02.530398339 +0000 UTC m=+53.647174005" Dec 13 02:06:02.582000 audit[4386]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:02.582000 audit[4386]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedd22e770 a2=0 a3=7ffedd22e75c items=0 ppid=2314 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:02.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:02.592000 audit[4386]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:02.592000 audit[4386]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffedd22e770 a2=0 a3=7ffedd22e75c items=0 ppid=2314 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:02.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:02.624000 audit[4388]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:02.624000 audit[4388]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce36d0a20 a2=0 a3=7ffce36d0a0c items=0 ppid=2314 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:02.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:02.636000 audit[4388]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:02.636000 audit[4388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffce36d0a20 a2=0 a3=7ffce36d0a0c items=0 ppid=2314 pid=4388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:02.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:03.249476 env[1227]: time="2024-12-13T02:06:03.249407633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:03.252849 env[1227]: time="2024-12-13T02:06:03.252790468Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:03.256018 env[1227]: time="2024-12-13T02:06:03.255976871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:03.259263 env[1227]: time="2024-12-13T02:06:03.259220852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:06:03.260252 env[1227]: time="2024-12-13T02:06:03.260205392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:06:03.263784 env[1227]: time="2024-12-13T02:06:03.263610902Z" level=info msg="CreateContainer within sandbox \"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:06:03.284826 env[1227]: time="2024-12-13T02:06:03.279715443Z" level=info msg="CreateContainer within sandbox \"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"22a527bbb8c8d90a6671078e8418c01c66ee03c71823a128c4fa8c42a84fd958\"" Dec 13 02:06:03.284826 env[1227]: time="2024-12-13T02:06:03.280838272Z" level=info msg="StartContainer for \"22a527bbb8c8d90a6671078e8418c01c66ee03c71823a128c4fa8c42a84fd958\"" Dec 13 02:06:03.318929 systemd[1]: Started cri-containerd-22a527bbb8c8d90a6671078e8418c01c66ee03c71823a128c4fa8c42a84fd958.scope. Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f53001ec5a8 items=0 ppid=3849 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613532376262623863386439306136363731303738653834313863 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.401000 audit: BPF prog-id=208 op=LOAD Dec 13 02:06:03.401000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000372018 items=0 ppid=3849 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613532376262623863386439306136363731303738653834313863 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit: BPF prog-id=209 op=LOAD Dec 13 02:06:03.402000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000372068 items=0 ppid=3849 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613532376262623863386439306136363731303738653834313863 Dec 13 02:06:03.402000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:06:03.402000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:06:03.402000 audit: BPF prog-id=210 op=LOAD Dec 13 02:06:03.402000 audit[4396]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003720f8 items=0 ppid=3849 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:03.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232613532376262623863386439306136363731303738653834313863 Dec 13 02:06:03.436873 env[1227]: time="2024-12-13T02:06:03.436798828Z" level=info msg="StartContainer for \"22a527bbb8c8d90a6671078e8418c01c66ee03c71823a128c4fa8c42a84fd958\" returns successfully" Dec 13 02:06:03.492626 kubelet[2143]: I1213 02:06:03.492594 2143 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:03.496576 kubelet[2143]: I1213 02:06:03.495799 2143 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:03.549241 kubelet[2143]: I1213 02:06:03.549103 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-rwvv2" podStartSLOduration=26.289248653 podStartE2EDuration="32.549044274s" podCreationTimestamp="2024-12-13 02:05:31 +0000 UTC" firstStartedPulling="2024-12-13 02:05:57.001533253 +0000 UTC m=+48.118308910" lastFinishedPulling="2024-12-13 02:06:03.261328873 +0000 UTC m=+54.378104531" observedRunningTime="2024-12-13 02:06:03.54872365 +0000 UTC m=+54.665499341" watchObservedRunningTime="2024-12-13 02:06:03.549044274 +0000 UTC m=+54.665819939" Dec 13 02:06:03.550187 kubelet[2143]: I1213 02:06:03.550156 2143 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-bb4b6bfdb-vlzl9" podStartSLOduration=29.436338207 podStartE2EDuration="33.550104037s" podCreationTimestamp="2024-12-13 02:05:30 +0000 UTC" firstStartedPulling="2024-12-13 02:05:57.676007263 +0000 UTC m=+48.792782907" lastFinishedPulling="2024-12-13 02:06:01.789773084 +0000 UTC m=+52.906548737" observedRunningTime="2024-12-13 02:06:02.532513936 +0000 UTC m=+53.649289600" watchObservedRunningTime="2024-12-13 02:06:03.550104037 +0000 UTC m=+54.666879701" Dec 13 02:06:04.276648 kubelet[2143]: I1213 02:06:04.276599 2143 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:06:04.276910 kubelet[2143]: I1213 02:06:04.276671 2143 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:06:04.337000 audit[4358]: AVC avc: denied { watch } for pid=4358 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_42.2431978561/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c612 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c612 tclass=file permissive=0 Dec 13 02:06:04.337000 audit[4358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b3ae60 a2=fc6 a3=0 items=0 ppid=4017 pid=4358 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c612 key=(null) Dec 13 02:06:04.337000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:06:04.512000 audit[4428]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:04.512000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd9d4230c0 a2=0 a3=7ffd9d4230ac items=0 ppid=2314 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:04.529000 audit[4428]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:04.529000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd9d4230c0 a2=0 a3=7ffd9d4230ac items=0 ppid=2314 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:04.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:04.573000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:04.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:04.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e91e90 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:04.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:04.573000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef0460 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:04.573000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:04.829000 audit[4319]: AVC avc: denied { watch } for pid=4319 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_42.2244525696/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c489 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c336,c489 tclass=file permissive=0 Dec 13 02:06:04.829000 audit[4319]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ea8720 a2=fc6 a3=0 items=0 ppid=3827 pid=4319 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c489 key=(null) Dec 13 02:06:04.829000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:06:05.228648 systemd[1]: Started sshd@9-10.128.0.42:22-139.178.68.195:56194.service. Dec 13 02:06:05.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.42:22-139.178.68.195:56194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:05.366000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.366000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010a31180 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.366000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.367000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.367000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0076d3f20 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.367000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.367000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0076d3f50 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.433000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.433000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c007a69da0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.433000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.524000 audit[4431]: USER_ACCT pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.526572 sshd[4431]: Accepted publickey for core from 139.178.68.195 port 56194 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:05.526000 audit[4431]: CRED_ACQ pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.526000 audit[4431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1860f00 a2=3 a3=0 items=0 ppid=1 pid=4431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:05.526000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:05.528397 sshd[4431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:05.537884 systemd-logind[1214]: New session 10 of user core. Dec 13 02:06:05.543178 systemd[1]: Started session-10.scope. Dec 13 02:06:05.545000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.545000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0082ef170 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.545000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:05.545000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c010e88bc0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:06:05.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:06:05.550000 audit[4431]: USER_START pid=4431 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.552000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.830819 sshd[4431]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:05.832000 audit[4431]: USER_END pid=4431 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.832000 audit[4431]: CRED_DISP pid=4431 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:05.836653 systemd[1]: sshd@9-10.128.0.42:22-139.178.68.195:56194.service: Deactivated successfully. Dec 13 02:06:05.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.42:22-139.178.68.195:56194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:05.837898 systemd-logind[1214]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:06:05.837942 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:06:05.839775 systemd-logind[1214]: Removed session 10. Dec 13 02:06:09.100608 env[1227]: time="2024-12-13T02:06:09.100539435Z" level=info msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.157 [WARNING][4459] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b82d29d9-8869-46f0-8ffd-8fe8e76896a2", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191", Pod:"csi-node-driver-rwvv2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8e741e7cf13", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.157 [INFO][4459] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.157 [INFO][4459] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" iface="eth0" netns="" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.157 [INFO][4459] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.157 [INFO][4459] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.193 [INFO][4466] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.193 [INFO][4466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.193 [INFO][4466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.204 [WARNING][4466] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.204 [INFO][4466] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.206 [INFO][4466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.209891 env[1227]: 2024-12-13 02:06:09.208 [INFO][4459] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.209891 env[1227]: time="2024-12-13T02:06:09.209892972Z" level=info msg="TearDown network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" successfully" Dec 13 02:06:09.211169 env[1227]: time="2024-12-13T02:06:09.209943843Z" level=info msg="StopPodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" returns successfully" Dec 13 02:06:09.211169 env[1227]: time="2024-12-13T02:06:09.210702387Z" level=info msg="RemovePodSandbox for \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" Dec 13 02:06:09.211169 env[1227]: time="2024-12-13T02:06:09.210749447Z" level=info msg="Forcibly stopping sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\"" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.293 [WARNING][4485] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b82d29d9-8869-46f0-8ffd-8fe8e76896a2", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"1a55ad1add336f1e43cd9ce0fcaae8c8d39db01b0086d76ec8e9493e2bd84191", Pod:"csi-node-driver-rwvv2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali8e741e7cf13", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.294 [INFO][4485] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.294 [INFO][4485] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" iface="eth0" netns="" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.294 [INFO][4485] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.294 [INFO][4485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.321 [INFO][4491] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.321 [INFO][4491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.321 [INFO][4491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.334 [WARNING][4491] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.334 [INFO][4491] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" HandleID="k8s-pod-network.9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-csi--node--driver--rwvv2-eth0" Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.336 [INFO][4491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.339485 env[1227]: 2024-12-13 02:06:09.338 [INFO][4485] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88" Dec 13 02:06:09.340524 env[1227]: time="2024-12-13T02:06:09.340474024Z" level=info msg="TearDown network for sandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" successfully" Dec 13 02:06:09.375964 env[1227]: time="2024-12-13T02:06:09.375786697Z" level=info msg="RemovePodSandbox \"9d419af958c0fa81e2b6e7784d1423b3d61b34e5eaec37ee195e8d6dce212a88\" returns successfully" Dec 13 02:06:09.377558 env[1227]: time="2024-12-13T02:06:09.377504849Z" level=info msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.445 [WARNING][4513] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0", GenerateName:"calico-kube-controllers-659cf67c9d-", Namespace:"calico-system", SelfLink:"", UID:"71446af3-6b18-4d4d-8adb-dcec326bae05", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"659cf67c9d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05", Pod:"calico-kube-controllers-659cf67c9d-s49nw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali308bbc4472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.447 [INFO][4513] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.447 [INFO][4513] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" iface="eth0" netns="" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.447 [INFO][4513] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.447 [INFO][4513] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.512 [INFO][4519] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.512 [INFO][4519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.512 [INFO][4519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.521 [WARNING][4519] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.521 [INFO][4519] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.525 [INFO][4519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.528855 env[1227]: 2024-12-13 02:06:09.527 [INFO][4513] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.529707 env[1227]: time="2024-12-13T02:06:09.528897801Z" level=info msg="TearDown network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" successfully" Dec 13 02:06:09.529707 env[1227]: time="2024-12-13T02:06:09.528942717Z" level=info msg="StopPodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" returns successfully" Dec 13 02:06:09.529707 env[1227]: time="2024-12-13T02:06:09.529505045Z" level=info msg="RemovePodSandbox for \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" Dec 13 02:06:09.529707 env[1227]: time="2024-12-13T02:06:09.529545768Z" level=info msg="Forcibly stopping sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\"" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.598 [WARNING][4537] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0", GenerateName:"calico-kube-controllers-659cf67c9d-", Namespace:"calico-system", SelfLink:"", UID:"71446af3-6b18-4d4d-8adb-dcec326bae05", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"659cf67c9d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9160e14ef85205b1267871154b33683c672664d8368e80ff92c09d3ee61e5c05", Pod:"calico-kube-controllers-659cf67c9d-s49nw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali308bbc4472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.599 [INFO][4537] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.599 [INFO][4537] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" iface="eth0" netns="" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.599 [INFO][4537] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.599 [INFO][4537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.633 [INFO][4543] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.633 [INFO][4543] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.633 [INFO][4543] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.640 [WARNING][4543] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.640 [INFO][4543] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" HandleID="k8s-pod-network.b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--kube--controllers--659cf67c9d--s49nw-eth0" Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.642 [INFO][4543] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.648136 env[1227]: 2024-12-13 02:06:09.645 [INFO][4537] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857" Dec 13 02:06:09.649352 env[1227]: time="2024-12-13T02:06:09.649300462Z" level=info msg="TearDown network for sandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" successfully" Dec 13 02:06:09.654719 env[1227]: time="2024-12-13T02:06:09.654685514Z" level=info msg="RemovePodSandbox \"b689b4fbe98d2a7235af00d3eef0fdf4911ad1a811f713f8610ce6f878edb857\" returns successfully" Dec 13 02:06:09.655428 env[1227]: time="2024-12-13T02:06:09.655401636Z" level=info msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.704 [WARNING][4562] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c", Pod:"calico-apiserver-bb4b6bfdb-wbqsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93ed05a8fef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.704 [INFO][4562] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.704 [INFO][4562] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" iface="eth0" netns="" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.704 [INFO][4562] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.704 [INFO][4562] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.749 [INFO][4569] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.749 [INFO][4569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.749 [INFO][4569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.757 [WARNING][4569] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.757 [INFO][4569] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.759 [INFO][4569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.762014 env[1227]: 2024-12-13 02:06:09.760 [INFO][4562] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.762991 env[1227]: time="2024-12-13T02:06:09.762927887Z" level=info msg="TearDown network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" successfully" Dec 13 02:06:09.762991 env[1227]: time="2024-12-13T02:06:09.762978341Z" level=info msg="StopPodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" returns successfully" Dec 13 02:06:09.763714 env[1227]: time="2024-12-13T02:06:09.763665037Z" level=info msg="RemovePodSandbox for \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" Dec 13 02:06:09.763889 env[1227]: time="2024-12-13T02:06:09.763714111Z" level=info msg="Forcibly stopping sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\"" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.832 [WARNING][4588] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"3a4c48ad-ffa9-4edd-b961-ff7503c17dbf", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"14909a8130f04b672898c8b46b35df394f005ea2bb49861c1f974bd9cc7c136c", Pod:"calico-apiserver-bb4b6bfdb-wbqsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali93ed05a8fef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.832 [INFO][4588] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.832 [INFO][4588] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" iface="eth0" netns="" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.832 [INFO][4588] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.833 [INFO][4588] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.870 [INFO][4594] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.871 [INFO][4594] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.871 [INFO][4594] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.881 [WARNING][4594] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.881 [INFO][4594] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" HandleID="k8s-pod-network.32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--wbqsn-eth0" Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.885 [INFO][4594] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:09.889136 env[1227]: 2024-12-13 02:06:09.887 [INFO][4588] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4" Dec 13 02:06:09.890194 env[1227]: time="2024-12-13T02:06:09.890130078Z" level=info msg="TearDown network for sandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" successfully" Dec 13 02:06:09.895498 env[1227]: time="2024-12-13T02:06:09.895441387Z" level=info msg="RemovePodSandbox \"32e87b1e99c15cfb2a02951eb7f1f66ba19f1e4af1472f9c77f141bfa340a5a4\" returns successfully" Dec 13 02:06:09.896494 env[1227]: time="2024-12-13T02:06:09.896459895Z" level=info msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.954 [WARNING][4615] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"34f3f832-181c-4d1c-948b-a208a381b8a6", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611", Pod:"coredns-76f75df574-vmtnj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6ff7119b2cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.955 [INFO][4615] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.955 [INFO][4615] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" iface="eth0" netns="" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.955 [INFO][4615] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.955 [INFO][4615] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.998 [INFO][4621] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.999 [INFO][4621] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:09.999 [INFO][4621] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:10.005 [WARNING][4621] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:10.005 [INFO][4621] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:10.007 [INFO][4621] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.010021 env[1227]: 2024-12-13 02:06:10.008 [INFO][4615] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.011847 env[1227]: time="2024-12-13T02:06:10.010044103Z" level=info msg="TearDown network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" successfully" Dec 13 02:06:10.011847 env[1227]: time="2024-12-13T02:06:10.010096623Z" level=info msg="StopPodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" returns successfully" Dec 13 02:06:10.011847 env[1227]: time="2024-12-13T02:06:10.010761700Z" level=info msg="RemovePodSandbox for \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" Dec 13 02:06:10.011847 env[1227]: time="2024-12-13T02:06:10.010856941Z" level=info msg="Forcibly stopping sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\"" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.066 [WARNING][4639] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"34f3f832-181c-4d1c-948b-a208a381b8a6", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"bfdbd73814db5e1b6acd9e9bf415e65219a63263e38264312adde78289af4611", Pod:"coredns-76f75df574-vmtnj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6ff7119b2cc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.066 [INFO][4639] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.066 [INFO][4639] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" iface="eth0" netns="" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.066 [INFO][4639] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.066 [INFO][4639] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.096 [INFO][4645] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.096 [INFO][4645] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.096 [INFO][4645] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.106 [WARNING][4645] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.106 [INFO][4645] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" HandleID="k8s-pod-network.56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--vmtnj-eth0" Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.108 [INFO][4645] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.110894 env[1227]: 2024-12-13 02:06:10.109 [INFO][4639] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac" Dec 13 02:06:10.112306 env[1227]: time="2024-12-13T02:06:10.112224080Z" level=info msg="TearDown network for sandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" successfully" Dec 13 02:06:10.132325 env[1227]: time="2024-12-13T02:06:10.132223182Z" level=info msg="RemovePodSandbox \"56f58232bba03e73e4f49752491af361895c24f95f1f024f31ef99198a35ccac\" returns successfully" Dec 13 02:06:10.133006 env[1227]: time="2024-12-13T02:06:10.132964619Z" level=info msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.201 [WARNING][4664] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175", Pod:"coredns-76f75df574-w2dlk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d254311116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.202 [INFO][4664] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.202 [INFO][4664] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" iface="eth0" netns="" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.202 [INFO][4664] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.202 [INFO][4664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.268 [INFO][4670] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.273 [INFO][4670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.273 [INFO][4670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.289 [WARNING][4670] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.289 [INFO][4670] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.291 [INFO][4670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.294892 env[1227]: 2024-12-13 02:06:10.293 [INFO][4664] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.294892 env[1227]: time="2024-12-13T02:06:10.294855712Z" level=info msg="TearDown network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" successfully" Dec 13 02:06:10.295778 env[1227]: time="2024-12-13T02:06:10.294900325Z" level=info msg="StopPodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" returns successfully" Dec 13 02:06:10.298461 env[1227]: time="2024-12-13T02:06:10.297494208Z" level=info msg="RemovePodSandbox for \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" Dec 13 02:06:10.298461 env[1227]: time="2024-12-13T02:06:10.297551395Z" level=info msg="Forcibly stopping sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\"" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.384 [WARNING][4689] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"54a720ca-5b3a-4638-9f1c-52ab3f8d28a8", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"9ee350e9217dccc653d3813bc86747b10e77c93b392d25cf3325d40dbd2df175", Pod:"coredns-76f75df574-w2dlk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d254311116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.385 [INFO][4689] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.385 [INFO][4689] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" iface="eth0" netns="" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.385 [INFO][4689] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.385 [INFO][4689] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.434 [INFO][4696] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.435 [INFO][4696] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.435 [INFO][4696] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.460 [WARNING][4696] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.460 [INFO][4696] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" HandleID="k8s-pod-network.aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-coredns--76f75df574--w2dlk-eth0" Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.470 [INFO][4696] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.475842 env[1227]: 2024-12-13 02:06:10.473 [INFO][4689] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89" Dec 13 02:06:10.475842 env[1227]: time="2024-12-13T02:06:10.474930728Z" level=info msg="TearDown network for sandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" successfully" Dec 13 02:06:10.480783 env[1227]: time="2024-12-13T02:06:10.480718295Z" level=info msg="RemovePodSandbox \"aaa5088085b401fddf43f361415b91e1e7ad370d71a89cb88b739fc62f71ca89\" returns successfully" Dec 13 02:06:10.481650 env[1227]: time="2024-12-13T02:06:10.481607028Z" level=info msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" Dec 13 02:06:10.607584 kernel: kauditd_printk_skb: 206 callbacks suppressed Dec 13 02:06:10.607743 kernel: audit: type=1400 audit(1734055570.574:1354): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.641097 kernel: audit: type=1400 audit(1734055570.574:1355): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.641289 kernel: audit: type=1300 audit(1734055570.574:1354): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fb7e0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fb7e0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.704864 kernel: audit: type=1327 audit(1734055570.574:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.574000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.566 [WARNING][4715] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f", Pod:"calico-apiserver-bb4b6bfdb-vlzl9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie4b60ed86c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.567 [INFO][4715] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.567 [INFO][4715] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" iface="eth0" netns="" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.567 [INFO][4715] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.567 [INFO][4715] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.612 [INFO][4721] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.612 [INFO][4721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.612 [INFO][4721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.645 [WARNING][4721] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.645 [INFO][4721] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.676 [INFO][4721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.706799 env[1227]: 2024-12-13 02:06:10.704 [INFO][4715] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.707685 env[1227]: time="2024-12-13T02:06:10.707638130Z" level=info msg="TearDown network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" successfully" Dec 13 02:06:10.707799 env[1227]: time="2024-12-13T02:06:10.707774832Z" level=info msg="StopPodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" returns successfully" Dec 13 02:06:10.708668 env[1227]: time="2024-12-13T02:06:10.708635895Z" level=info msg="RemovePodSandbox for \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" Dec 13 02:06:10.708872 env[1227]: time="2024-12-13T02:06:10.708820133Z" level=info msg="Forcibly stopping sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\"" Dec 13 02:06:10.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fbb60 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.765545 kernel: audit: type=1400 audit(1734055570.574:1356): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.765698 kernel: audit: type=1300 audit(1734055570.574:1356): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fbb60 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.765768 kernel: audit: type=1327 audit(1734055570.574:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.579000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.821867 kernel: audit: type=1400 audit(1734055570.579:1357): avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:06:10.822058 kernel: audit: type=1300 audit(1734055570.579:1357): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fbd00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.579000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007fbd00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.887359 kernel: audit: type=1327 audit(1734055570.579:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.574000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b897c0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:06:10.574000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:06:10.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.42:22-139.178.68.195:52600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:10.897648 systemd[1]: Started sshd@10-10.128.0.42:22-139.178.68.195:52600.service. Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.831 [WARNING][4740] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0", GenerateName:"calico-apiserver-bb4b6bfdb-", Namespace:"calico-apiserver", SelfLink:"", UID:"cd7a15ed-d9c2-4e50-8fe5-815c83e7cab6", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb4b6bfdb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-757f76bf04de02c5b59f.c.flatcar-212911.internal", ContainerID:"36c7a526c9e595e175966ae8e45644ebca786ded3d823875135ecea54b86494f", Pod:"calico-apiserver-bb4b6bfdb-vlzl9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie4b60ed86c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.831 [INFO][4740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.832 [INFO][4740] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" iface="eth0" netns="" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.832 [INFO][4740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.832 [INFO][4740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.890 [INFO][4746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.890 [INFO][4746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.890 [INFO][4746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.922 [WARNING][4746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.922 [INFO][4746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" HandleID="k8s-pod-network.aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Workload="ci--3510--3--6--757f76bf04de02c5b59f.c.flatcar--212911.internal-k8s-calico--apiserver--bb4b6bfdb--vlzl9-eth0" Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.925 [INFO][4746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:06:10.929175 env[1227]: 2024-12-13 02:06:10.927 [INFO][4740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125" Dec 13 02:06:10.930211 env[1227]: time="2024-12-13T02:06:10.930142845Z" level=info msg="TearDown network for sandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" successfully" Dec 13 02:06:10.936622 env[1227]: time="2024-12-13T02:06:10.936497796Z" level=info msg="RemovePodSandbox \"aa7d4891706bcfb1f73b52d1362385e3c8d73bf80d7e781f8fe2f1f1d176a125\" returns successfully" Dec 13 02:06:11.200000 audit[4753]: USER_ACCT pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.203968 sshd[4753]: Accepted publickey for core from 139.178.68.195 port 52600 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:11.202000 audit[4753]: CRED_ACQ pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.202000 audit[4753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd73ff7bc0 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:11.202000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:11.205036 sshd[4753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:11.213900 systemd-logind[1214]: New session 11 of user core. Dec 13 02:06:11.214898 systemd[1]: Started session-11.scope. Dec 13 02:06:11.223000 audit[4753]: USER_START pid=4753 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.227000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.306102 systemd[1]: run-containerd-runc-k8s.io-c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2-runc.24tPQY.mount: Deactivated successfully. Dec 13 02:06:11.550843 sshd[4753]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:11.551000 audit[4753]: USER_END pid=4753 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.551000 audit[4753]: CRED_DISP pid=4753 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:11.555987 systemd[1]: sshd@10-10.128.0.42:22-139.178.68.195:52600.service: Deactivated successfully. Dec 13 02:06:11.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.42:22-139.178.68.195:52600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:11.557265 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:06:11.558249 systemd-logind[1214]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:06:11.559510 systemd-logind[1214]: Removed session 11. Dec 13 02:06:16.599263 systemd[1]: Started sshd@11-10.128.0.42:22-139.178.68.195:45830.service. Dec 13 02:06:16.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.42:22-139.178.68.195:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:16.629970 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 02:06:16.630162 kernel: audit: type=1130 audit(1734055576.599:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.42:22-139.178.68.195:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:16.925975 kernel: audit: type=1101 audit(1734055576.895:1368): pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.895000 audit[4790]: USER_ACCT pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.926715 sshd[4790]: Accepted publickey for core from 139.178.68.195 port 45830 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:16.927172 sshd[4790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:16.925000 audit[4790]: CRED_ACQ pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.936228 systemd[1]: Started session-12.scope. Dec 13 02:06:16.938568 systemd-logind[1214]: New session 12 of user core. Dec 13 02:06:16.955278 kernel: audit: type=1103 audit(1734055576.925:1369): pid=4790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.955416 kernel: audit: type=1006 audit(1734055576.925:1370): pid=4790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 02:06:16.925000 audit[4790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8bde6b50 a2=3 a3=0 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:16.999887 kernel: audit: type=1300 audit(1734055576.925:1370): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8bde6b50 a2=3 a3=0 items=0 ppid=1 pid=4790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:17.000065 kernel: audit: type=1327 audit(1734055576.925:1370): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:16.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:17.009148 kernel: audit: type=1105 audit(1734055576.943:1371): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.943000 audit[4790]: USER_START pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:16.954000 audit[4792]: CRED_ACQ pid=4792 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.065880 kernel: audit: type=1103 audit(1734055576.954:1372): pid=4792 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.214562 sshd[4790]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:17.216000 audit[4790]: USER_END pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.220758 systemd-logind[1214]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:06:17.223647 systemd[1]: sshd@11-10.128.0.42:22-139.178.68.195:45830.service: Deactivated successfully. Dec 13 02:06:17.224874 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:06:17.228710 systemd-logind[1214]: Removed session 12. Dec 13 02:06:17.217000 audit[4790]: CRED_DISP pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.250845 kernel: audit: type=1106 audit(1734055577.216:1373): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.250921 kernel: audit: type=1104 audit(1734055577.217:1374): pid=4790 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.42:22-139.178.68.195:45830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:17.281779 systemd[1]: Started sshd@12-10.128.0.42:22-139.178.68.195:45836.service. Dec 13 02:06:17.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.42:22-139.178.68.195:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:17.568000 audit[4805]: USER_ACCT pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.569345 sshd[4805]: Accepted publickey for core from 139.178.68.195 port 45836 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:17.569000 audit[4805]: CRED_ACQ pid=4805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.569000 audit[4805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9ea40110 a2=3 a3=0 items=0 ppid=1 pid=4805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:17.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:17.571326 sshd[4805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:17.579088 systemd[1]: Started session-13.scope. Dec 13 02:06:17.580584 systemd-logind[1214]: New session 13 of user core. Dec 13 02:06:17.588000 audit[4805]: USER_START pid=4805 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.591000 audit[4807]: CRED_ACQ pid=4807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.904642 sshd[4805]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:17.906000 audit[4805]: USER_END pid=4805 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.906000 audit[4805]: CRED_DISP pid=4805 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:17.909417 systemd[1]: sshd@12-10.128.0.42:22-139.178.68.195:45836.service: Deactivated successfully. Dec 13 02:06:17.910745 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:06:17.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.42:22-139.178.68.195:45836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:17.911767 systemd-logind[1214]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:06:17.913025 systemd-logind[1214]: Removed session 13. Dec 13 02:06:17.952265 systemd[1]: Started sshd@13-10.128.0.42:22-139.178.68.195:45848.service. Dec 13 02:06:17.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.42:22-139.178.68.195:45848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:18.238000 audit[4814]: USER_ACCT pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.239919 sshd[4814]: Accepted publickey for core from 139.178.68.195 port 45848 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:18.239000 audit[4814]: CRED_ACQ pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.239000 audit[4814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2833e30 a2=3 a3=0 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:18.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:18.241356 sshd[4814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:18.248437 systemd[1]: Started session-14.scope. Dec 13 02:06:18.249110 systemd-logind[1214]: New session 14 of user core. Dec 13 02:06:18.256000 audit[4814]: USER_START pid=4814 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.259000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.544369 sshd[4814]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:18.545000 audit[4814]: USER_END pid=4814 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.545000 audit[4814]: CRED_DISP pid=4814 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:18.549511 systemd[1]: sshd@13-10.128.0.42:22-139.178.68.195:45848.service: Deactivated successfully. Dec 13 02:06:18.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.42:22-139.178.68.195:45848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:18.551228 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:06:18.555344 systemd-logind[1214]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:06:18.556661 systemd-logind[1214]: Removed session 14. Dec 13 02:06:23.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.42:22-139.178.68.195:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:23.592377 systemd[1]: Started sshd@14-10.128.0.42:22-139.178.68.195:45864.service. Dec 13 02:06:23.598124 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:06:23.598246 kernel: audit: type=1130 audit(1734055583.591:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.42:22-139.178.68.195:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:23.887000 audit[4827]: USER_ACCT pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.889740 sshd[4827]: Accepted publickey for core from 139.178.68.195 port 45864 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:23.918898 kernel: audit: type=1101 audit(1734055583.887:1395): pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.919719 sshd[4827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:23.928887 systemd[1]: Started session-15.scope. Dec 13 02:06:23.929728 systemd-logind[1214]: New session 15 of user core. Dec 13 02:06:23.917000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.960894 kernel: audit: type=1103 audit(1734055583.917:1396): pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.985925 kernel: audit: type=1006 audit(1734055583.917:1397): pid=4827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:06:23.917000 audit[4827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1ab9df0 a2=3 a3=0 items=0 ppid=1 pid=4827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:24.015932 kernel: audit: type=1300 audit(1734055583.917:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1ab9df0 a2=3 a3=0 items=0 ppid=1 pid=4827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:23.917000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:24.026899 kernel: audit: type=1327 audit(1734055583.917:1397): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:24.027074 kernel: audit: type=1105 audit(1734055583.968:1398): pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:23.968000 audit[4827]: USER_START pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.015000 audit[4829]: CRED_ACQ pid=4829 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.083791 kernel: audit: type=1103 audit(1734055584.015:1399): pid=4829 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.275613 sshd[4827]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:24.276000 audit[4827]: USER_END pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.276000 audit[4827]: CRED_DISP pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.311688 systemd[1]: sshd@14-10.128.0.42:22-139.178.68.195:45864.service: Deactivated successfully. Dec 13 02:06:24.312999 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:06:24.315872 systemd-logind[1214]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:06:24.318458 systemd-logind[1214]: Removed session 15. Dec 13 02:06:24.334555 kernel: audit: type=1106 audit(1734055584.276:1400): pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.334793 kernel: audit: type=1104 audit(1734055584.276:1401): pid=4827 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:24.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.42:22-139.178.68.195:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:29.352852 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:29.353044 kernel: audit: type=1130 audit(1734055589.320:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.42:22-139.178.68.195:41432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:29.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.42:22-139.178.68.195:41432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:29.321799 systemd[1]: Started sshd@15-10.128.0.42:22-139.178.68.195:41432.service. Dec 13 02:06:29.627000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.659044 kernel: audit: type=1101 audit(1734055589.627:1404): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.659173 sshd[4847]: Accepted publickey for core from 139.178.68.195 port 41432 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:29.657000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.661274 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:29.670439 systemd[1]: Started session-16.scope. Dec 13 02:06:29.672793 systemd-logind[1214]: New session 16 of user core. Dec 13 02:06:29.686890 kernel: audit: type=1103 audit(1734055589.657:1405): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.658000 audit[4847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda019b5a0 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.731638 kernel: audit: type=1006 audit(1734055589.658:1406): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:06:29.731827 kernel: audit: type=1300 audit(1734055589.658:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda019b5a0 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:29.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:29.680000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.741886 kernel: audit: type=1327 audit(1734055589.658:1406): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:29.741942 kernel: audit: type=1105 audit(1734055589.680:1407): pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.774937 kernel: audit: type=1103 audit(1734055589.684:1408): pid=4849 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.684000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.953556 sshd[4847]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:29.953000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.960592 systemd[1]: sshd@15-10.128.0.42:22-139.178.68.195:41432.service: Deactivated successfully. Dec 13 02:06:29.962931 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:06:29.964437 systemd-logind[1214]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:06:29.965889 systemd-logind[1214]: Removed session 16. Dec 13 02:06:29.990966 kernel: audit: type=1106 audit(1734055589.953:1409): pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.991164 kernel: audit: type=1104 audit(1734055589.955:1410): pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.955000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:29.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.42:22-139.178.68.195:41432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:30.838581 systemd[1]: run-containerd-runc-k8s.io-df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e-runc.R267A8.mount: Deactivated successfully. Dec 13 02:06:33.943957 systemd[1]: run-containerd-runc-k8s.io-c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2-runc.hN2N3P.mount: Deactivated successfully. Dec 13 02:06:34.999917 systemd[1]: Started sshd@16-10.128.0.42:22-139.178.68.195:41448.service. Dec 13 02:06:35.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.42:22-139.178.68.195:41448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:35.007499 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:35.007624 kernel: audit: type=1130 audit(1734055595.001:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.42:22-139.178.68.195:41448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:35.292000 audit[4909]: USER_ACCT pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.295430 sshd[4909]: Accepted publickey for core from 139.178.68.195 port 41448 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:35.322000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.324565 sshd[4909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:35.338023 systemd[1]: Started session-17.scope. Dec 13 02:06:35.339370 systemd-logind[1214]: New session 17 of user core. Dec 13 02:06:35.352790 kernel: audit: type=1101 audit(1734055595.292:1413): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.352928 kernel: audit: type=1103 audit(1734055595.322:1414): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.352973 kernel: audit: type=1006 audit(1734055595.323:1415): pid=4909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:06:35.366348 kernel: audit: type=1300 audit(1734055595.323:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd914dc150 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.323000 audit[4909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd914dc150 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:35.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:35.403712 kernel: audit: type=1327 audit(1734055595.323:1415): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:35.403933 kernel: audit: type=1105 audit(1734055595.352:1416): pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.352000 audit[4909]: USER_START pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.356000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.437259 kernel: audit: type=1103 audit(1734055595.356:1417): pid=4911 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.662623 sshd[4909]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:35.664000 audit[4909]: USER_END pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.669404 systemd[1]: sshd@16-10.128.0.42:22-139.178.68.195:41448.service: Deactivated successfully. Dec 13 02:06:35.670613 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:06:35.678264 systemd-logind[1214]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:06:35.679970 systemd-logind[1214]: Removed session 17. Dec 13 02:06:35.664000 audit[4909]: CRED_DISP pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.721935 kernel: audit: type=1106 audit(1734055595.664:1418): pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.722099 kernel: audit: type=1104 audit(1734055595.664:1419): pid=4909 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:35.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.42:22-139.178.68.195:41448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.738771 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:06:40.739037 kernel: audit: type=1130 audit(1734055600.707:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.42:22-139.178.68.195:55994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.42:22-139.178.68.195:55994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:40.708317 systemd[1]: Started sshd@17-10.128.0.42:22-139.178.68.195:55994.service. Dec 13 02:06:41.005000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.007686 sshd[4923]: Accepted publickey for core from 139.178.68.195 port 55994 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:41.037198 kernel: audit: type=1101 audit(1734055601.005:1422): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.038529 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:41.036000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.067960 systemd-logind[1214]: New session 18 of user core. Dec 13 02:06:41.076037 systemd[1]: Started session-18.scope. Dec 13 02:06:41.083632 kernel: audit: type=1103 audit(1734055601.036:1423): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.084685 kernel: audit: type=1006 audit(1734055601.037:1424): pid=4923 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:06:41.084789 kernel: audit: type=1300 audit(1734055601.037:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc619f3370 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.037000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc619f3370 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.091259 kubelet[2143]: I1213 02:06:41.089499 2143 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:06:41.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:41.124850 kernel: audit: type=1327 audit(1734055601.037:1424): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:41.083000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.158845 kernel: audit: type=1105 audit(1734055601.083:1425): pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.093000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.188844 kernel: audit: type=1103 audit(1734055601.093:1426): pid=4925 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.185000 audit[4927]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.185000 audit[4927]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd5d9f36e0 a2=0 a3=7ffd5d9f36cc items=0 ppid=2314 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.239126 kernel: audit: type=1325 audit(1734055601.185:1427): table=filter:117 family=2 entries=8 op=nft_register_rule pid=4927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.239289 kernel: audit: type=1300 audit(1734055601.185:1427): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd5d9f36e0 a2=0 a3=7ffd5d9f36cc items=0 ppid=2314 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:41.246000 audit[4927]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:41.246000 audit[4927]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd5d9f36e0 a2=0 a3=7ffd5d9f36cc items=0 ppid=2314 pid=4927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:41.442620 sshd[4923]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:41.443000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.443000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.447657 systemd-logind[1214]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:06:41.447957 systemd[1]: sshd@17-10.128.0.42:22-139.178.68.195:55994.service: Deactivated successfully. Dec 13 02:06:41.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.42:22-139.178.68.195:55994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:41.449243 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:06:41.450453 systemd-logind[1214]: Removed session 18. Dec 13 02:06:41.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.42:22-139.178.68.195:56002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:41.489960 systemd[1]: Started sshd@18-10.128.0.42:22-139.178.68.195:56002.service. Dec 13 02:06:41.781000 audit[4956]: USER_ACCT pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.782700 sshd[4956]: Accepted publickey for core from 139.178.68.195 port 56002 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:41.783000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.783000 audit[4956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd09120200 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:41.783000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:41.785099 sshd[4956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:41.791856 systemd-logind[1214]: New session 19 of user core. Dec 13 02:06:41.792614 systemd[1]: Started session-19.scope. Dec 13 02:06:41.801000 audit[4956]: USER_START pid=4956 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:41.803000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.179511 sshd[4956]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:42.180000 audit[4956]: USER_END pid=4956 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.180000 audit[4956]: CRED_DISP pid=4956 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.184132 systemd[1]: sshd@18-10.128.0.42:22-139.178.68.195:56002.service: Deactivated successfully. Dec 13 02:06:42.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.42:22-139.178.68.195:56002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:42.185431 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:06:42.186569 systemd-logind[1214]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:06:42.188012 systemd-logind[1214]: Removed session 19. Dec 13 02:06:42.227087 systemd[1]: Started sshd@19-10.128.0.42:22-139.178.68.195:56004.service. Dec 13 02:06:42.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.42:22-139.178.68.195:56004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:42.515000 audit[4966]: USER_ACCT pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.516466 sshd[4966]: Accepted publickey for core from 139.178.68.195 port 56004 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:42.518000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.518000 audit[4966]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1d68fc40 a2=3 a3=0 items=0 ppid=1 pid=4966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:42.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:42.520183 sshd[4966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:42.528525 systemd[1]: Started session-20.scope. Dec 13 02:06:42.529200 systemd-logind[1214]: New session 20 of user core. Dec 13 02:06:42.538000 audit[4966]: USER_START pid=4966 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:42.541000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.247000 audit[4978]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.247000 audit[4978]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc08035c20 a2=0 a3=7ffc08035c0c items=0 ppid=2314 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.252000 audit[4978]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.252000 audit[4978]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc08035c20 a2=0 a3=0 items=0 ppid=2314 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.283000 audit[4980]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.283000 audit[4980]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe9b154d80 a2=0 a3=7ffe9b154d6c items=0 ppid=2314 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.292027 sshd[4966]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:45.292000 audit[4966]: USER_END pid=4966 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.293000 audit[4966]: CRED_DISP pid=4966 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.296435 systemd-logind[1214]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:06:45.298218 systemd[1]: sshd@19-10.128.0.42:22-139.178.68.195:56004.service: Deactivated successfully. Dec 13 02:06:45.299424 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:06:45.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.42:22-139.178.68.195:56004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:45.301553 systemd-logind[1214]: Removed session 20. Dec 13 02:06:45.302000 audit[4980]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:45.302000 audit[4980]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe9b154d80 a2=0 a3=0 items=0 ppid=2314 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:45.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.42:22-139.178.68.195:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:45.337904 systemd[1]: Started sshd@20-10.128.0.42:22-139.178.68.195:56006.service. Dec 13 02:06:45.627000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.630413 sshd[4983]: Accepted publickey for core from 139.178.68.195 port 56006 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:45.629000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.630000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf8c21170 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:45.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:45.631612 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:45.638325 systemd-logind[1214]: New session 21 of user core. Dec 13 02:06:45.639186 systemd[1]: Started session-21.scope. Dec 13 02:06:45.647000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:45.649000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.215130 sshd[4983]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:46.217000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.220703 systemd[1]: sshd@20-10.128.0.42:22-139.178.68.195:56006.service: Deactivated successfully. Dec 13 02:06:46.225384 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 02:06:46.225497 kernel: audit: type=1106 audit(1734055606.217:1460): pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.246611 systemd-logind[1214]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:06:46.262894 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:06:46.271231 systemd[1]: Started sshd@21-10.128.0.42:22-139.178.68.195:37288.service. Dec 13 02:06:46.272891 systemd-logind[1214]: Removed session 21. Dec 13 02:06:46.336240 kernel: audit: type=1104 audit(1734055606.217:1461): pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.336435 kernel: audit: type=1131 audit(1734055606.220:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.42:22-139.178.68.195:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.217000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.42:22-139.178.68.195:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.42:22-139.178.68.195:37288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.366855 kernel: audit: type=1130 audit(1734055606.270:1463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.42:22-139.178.68.195:37288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.579000 audit[4993]: USER_ACCT pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.610214 sshd[4993]: Accepted publickey for core from 139.178.68.195 port 37288 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:46.610840 kernel: audit: type=1101 audit(1734055606.579:1464): pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.611090 sshd[4993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:46.609000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.624149 systemd-logind[1214]: New session 22 of user core. Dec 13 02:06:46.626933 systemd[1]: Started session-22.scope. Dec 13 02:06:46.642595 kernel: audit: type=1103 audit(1734055606.609:1465): pid=4993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.659947 kernel: audit: type=1006 audit(1734055606.609:1466): pid=4993 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 02:06:46.609000 audit[4993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc507e19a0 a2=3 a3=0 items=0 ppid=1 pid=4993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:46.689006 kernel: audit: type=1300 audit(1734055606.609:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc507e19a0 a2=3 a3=0 items=0 ppid=1 pid=4993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:46.689123 kernel: audit: type=1327 audit(1734055606.609:1466): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:46.633000 audit[4993]: USER_START pid=4993 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.647000 audit[4995]: CRED_ACQ pid=4995 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.730839 kernel: audit: type=1105 audit(1734055606.633:1467): pid=4993 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.921307 sshd[4993]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:46.923000 audit[4993]: USER_END pid=4993 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.924000 audit[4993]: CRED_DISP pid=4993 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:46.929403 systemd-logind[1214]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:06:46.929892 systemd[1]: sshd@21-10.128.0.42:22-139.178.68.195:37288.service: Deactivated successfully. Dec 13 02:06:46.931158 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:06:46.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.42:22-139.178.68.195:37288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:46.932981 systemd-logind[1214]: Removed session 22. Dec 13 02:06:51.710000 audit[5006]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.717160 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 02:06:51.717267 kernel: audit: type=1325 audit(1734055611.710:1472): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.734848 kernel: audit: type=1300 audit(1734055611.710:1472): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffae375b80 a2=0 a3=7fffae375b6c items=0 ppid=2314 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.710000 audit[5006]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffae375b80 a2=0 a3=7fffae375b6c items=0 ppid=2314 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.771267 kernel: audit: type=1327 audit(1734055611.710:1472): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.766000 audit[5006]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.782857 kernel: audit: type=1325 audit(1734055611.766:1473): table=nat:124 family=2 entries=106 op=nft_register_chain pid=5006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:06:51.766000 audit[5006]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffae375b80 a2=0 a3=7fffae375b6c items=0 ppid=2314 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.832072 kernel: audit: type=1300 audit(1734055611.766:1473): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffae375b80 a2=0 a3=7fffae375b6c items=0 ppid=2314 pid=5006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:51.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.847876 kernel: audit: type=1327 audit(1734055611.766:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:06:51.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.42:22-139.178.68.195:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:51.966339 systemd[1]: Started sshd@22-10.128.0.42:22-139.178.68.195:37292.service. Dec 13 02:06:51.991937 kernel: audit: type=1130 audit(1734055611.965:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.42:22-139.178.68.195:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:52.262000 audit[5009]: USER_ACCT pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.263518 sshd[5009]: Accepted publickey for core from 139.178.68.195 port 37292 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:52.292000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.294664 sshd[5009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:52.307405 systemd[1]: Started session-23.scope. Dec 13 02:06:52.309444 systemd-logind[1214]: New session 23 of user core. Dec 13 02:06:52.319081 kernel: audit: type=1101 audit(1734055612.262:1475): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.319184 kernel: audit: type=1103 audit(1734055612.292:1476): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.293000 audit[5009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc13556320 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:52.293000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:52.317000 audit[5009]: USER_START pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.319000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.336866 kernel: audit: type=1006 audit(1734055612.293:1477): pid=5009 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:06:52.566410 sshd[5009]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:52.567000 audit[5009]: USER_END pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.568000 audit[5009]: CRED_DISP pid=5009 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:52.571640 systemd-logind[1214]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:06:52.572099 systemd[1]: sshd@22-10.128.0.42:22-139.178.68.195:37292.service: Deactivated successfully. Dec 13 02:06:52.573332 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:06:52.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.42:22-139.178.68.195:37292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:52.574980 systemd-logind[1214]: Removed session 23. Dec 13 02:06:57.615277 systemd[1]: Started sshd@23-10.128.0.42:22-139.178.68.195:55846.service. Dec 13 02:06:57.633631 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:06:57.633787 kernel: audit: type=1130 audit(1734055617.615:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.42:22-139.178.68.195:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:57.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.42:22-139.178.68.195:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:06:57.911000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.912922 sshd[5025]: Accepted publickey for core from 139.178.68.195 port 55846 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:06:57.943861 kernel: audit: type=1101 audit(1734055617.911:1484): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.943000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.945264 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:06:57.955302 systemd[1]: Started session-24.scope. Dec 13 02:06:57.956471 systemd-logind[1214]: New session 24 of user core. Dec 13 02:06:57.970891 kernel: audit: type=1103 audit(1734055617.943:1485): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.016556 kernel: audit: type=1006 audit(1734055617.943:1486): pid=5025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:06:58.016710 kernel: audit: type=1300 audit(1734055617.943:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff708fe490 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.943000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff708fe490 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:06:57.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:57.967000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.059142 kernel: audit: type=1327 audit(1734055617.943:1486): proctitle=737368643A20636F7265205B707269765D Dec 13 02:06:58.059356 kernel: audit: type=1105 audit(1734055617.967:1487): pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.059409 kernel: audit: type=1103 audit(1734055617.972:1488): pid=5027 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:57.972000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.265102 sshd[5025]: pam_unix(sshd:session): session closed for user core Dec 13 02:06:58.266000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.280775 systemd[1]: sshd@23-10.128.0.42:22-139.178.68.195:55846.service: Deactivated successfully. Dec 13 02:06:58.282057 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:06:58.284973 systemd-logind[1214]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:06:58.286993 systemd-logind[1214]: Removed session 24. Dec 13 02:06:58.266000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.352122 kernel: audit: type=1106 audit(1734055618.266:1489): pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.352294 kernel: audit: type=1104 audit(1734055618.266:1490): pid=5025 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:06:58.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.42:22-139.178.68.195:55846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:00.839204 systemd[1]: run-containerd-runc-k8s.io-df49ddd79626bf86949a0a9f5489fc90c16cf1e3f028bb40c09a149a6f2f456e-runc.D8SMkV.mount: Deactivated successfully. Dec 13 02:07:03.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.42:22-139.178.68.195:55862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:03.312591 systemd[1]: Started sshd@24-10.128.0.42:22-139.178.68.195:55862.service. Dec 13 02:07:03.318578 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:07:03.318664 kernel: audit: type=1130 audit(1734055623.312:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.42:22-139.178.68.195:55862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:03.605000 audit[5060]: USER_ACCT pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.636859 kernel: audit: type=1101 audit(1734055623.605:1493): pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.636971 sshd[5060]: Accepted publickey for core from 139.178.68.195 port 55862 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:03.638083 sshd[5060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:03.645667 systemd-logind[1214]: New session 25 of user core. Dec 13 02:07:03.646371 systemd[1]: Started session-25.scope. Dec 13 02:07:03.636000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.692676 kernel: audit: type=1103 audit(1734055623.636:1494): pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.692858 kernel: audit: type=1006 audit(1734055623.636:1495): pid=5060 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:07:03.692934 kernel: audit: type=1300 audit(1734055623.636:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad6bf890 a2=3 a3=0 items=0 ppid=1 pid=5060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:03.636000 audit[5060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad6bf890 a2=3 a3=0 items=0 ppid=1 pid=5060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:03.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:03.670000 audit[5060]: USER_START pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.764311 kernel: audit: type=1327 audit(1734055623.636:1495): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:03.764498 kernel: audit: type=1105 audit(1734055623.670:1496): pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.766846 kernel: audit: type=1103 audit(1734055623.676:1497): pid=5062 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.676000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.939628 sshd[5060]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:03.941000 audit[5060]: USER_END pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.947000 audit[5060]: CRED_DISP pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.990407 systemd[1]: sshd@24-10.128.0.42:22-139.178.68.195:55862.service: Deactivated successfully. Dec 13 02:07:03.991669 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:07:03.999126 kernel: audit: type=1106 audit(1734055623.941:1498): pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.999244 kernel: audit: type=1104 audit(1734055623.947:1499): pid=5060 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:03.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.42:22-139.178.68.195:55862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:04.000383 systemd-logind[1214]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:07:04.002172 systemd-logind[1214]: Removed session 25. Dec 13 02:07:04.338000 audit[4358]: AVC avc: denied { watch } for pid=4358 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_42.2431978561/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c95,c612 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c95,c612 tclass=file permissive=0 Dec 13 02:07:04.338000 audit[4358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d52aa0 a2=fc6 a3=0 items=0 ppid=4017 pid=4358 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c95,c612 key=(null) Dec 13 02:07:04.338000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:07:04.575000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:04.575000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:04.575000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00259a9c0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:04.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:04.575000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00143efc0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:04.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:04.830000 audit[4319]: AVC avc: denied { watch } for pid=4319 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_05_42.2244525696/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c489 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c336,c489 tclass=file permissive=0 Dec 13 02:07:04.830000 audit[4319]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000aacca0 a2=fc6 a3=0 items=0 ppid=3827 pid=4319 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c489 key=(null) Dec 13 02:07:04.830000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:07:05.367000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.367000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c01138e0c0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:05.368000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.368000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00dcf84b0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.368000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:05.368000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.368000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00dcf84e0 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.368000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:05.434000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.434000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00fd29740 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.434000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:05.545000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.545000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01013d320 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:05.546000 audit[1991]: AVC avc: denied { watch } for pid=1991 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:05.546000 audit[1991]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c010e89040 a2=fc6 a3=0 items=0 ppid=1848 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c305,c503 key=(null) Dec 13 02:07:05.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3432002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:07:08.988566 systemd[1]: Started sshd@25-10.128.0.42:22-139.178.68.195:35956.service. Dec 13 02:07:09.009193 kernel: kauditd_printk_skb: 31 callbacks suppressed Dec 13 02:07:09.009352 kernel: audit: type=1130 audit(1734055628.987:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.42:22-139.178.68.195:35956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:08.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.42:22-139.178.68.195:35956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:09.312998 kernel: audit: type=1101 audit(1734055629.281:1512): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.281000 audit[5073]: USER_ACCT pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.313354 sshd[5073]: Accepted publickey for core from 139.178.68.195 port 35956 ssh2: RSA SHA256:iNfeuC4o6O46DLX6rqVJVwfztbFRXyh3VDk9s2BL7mw Dec 13 02:07:09.311000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.314485 sshd[5073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:07:09.323221 systemd[1]: Started session-26.scope. Dec 13 02:07:09.325242 systemd-logind[1214]: New session 26 of user core. Dec 13 02:07:09.339828 kernel: audit: type=1103 audit(1734055629.311:1513): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.312000 audit[5073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5934af90 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:09.391469 kernel: audit: type=1006 audit(1734055629.312:1514): pid=5073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:07:09.391613 kernel: audit: type=1300 audit(1734055629.312:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5934af90 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:07:09.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:09.401149 kernel: audit: type=1327 audit(1734055629.312:1514): proctitle=737368643A20636F7265205B707269765D Dec 13 02:07:09.332000 audit[5073]: USER_START pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.434017 kernel: audit: type=1105 audit(1734055629.332:1515): pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.434196 kernel: audit: type=1103 audit(1734055629.341:1516): pid=5077 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.341000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.593930 sshd[5073]: pam_unix(sshd:session): session closed for user core Dec 13 02:07:09.595000 audit[5073]: USER_END pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.600477 systemd[1]: sshd@25-10.128.0.42:22-139.178.68.195:35956.service: Deactivated successfully. Dec 13 02:07:09.601717 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:07:09.604009 systemd-logind[1214]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:07:09.605764 systemd-logind[1214]: Removed session 26. Dec 13 02:07:09.595000 audit[5073]: CRED_DISP pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.654315 kernel: audit: type=1106 audit(1734055629.595:1517): pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.654464 kernel: audit: type=1104 audit(1734055629.595:1518): pid=5073 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:07:09.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.42:22-139.178.68.195:35956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:07:10.575000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:10.575000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:10.575000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00203ea60 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:10.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:10.575000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002338bc0 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:10.575000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:10.580000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:10.580000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002338f00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:10.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:10.609000 audit[1957]: AVC avc: denied { watch } for pid=1957 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:07:10.609000 audit[1957]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00203ec00 a2=fc6 a3=0 items=0 ppid=1823 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c144,c335 key=(null) Dec 13 02:07:10.609000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:07:11.301200 systemd[1]: run-containerd-runc-k8s.io-c92e87c251a0a4704af85ff4338cb13f2d09edaf8b3efca65568fd9c3b9f5af2-runc.KDEYlV.mount: Deactivated successfully.