Dec 13 14:20:15.101593 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:20:15.101634 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:20:15.101651 kernel: BIOS-provided physical RAM map: Dec 13 14:20:15.101664 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:20:15.101677 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:20:15.101688 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:20:15.101707 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:20:15.101720 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:20:15.101732 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:20:15.101745 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:20:15.101758 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:20:15.101771 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:20:15.101784 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:20:15.101798 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:20:15.101820 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:20:15.101835 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:20:15.101849 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:20:15.101864 kernel: NX (Execute Disable) protection: active Dec 13 14:20:15.101879 kernel: efi: EFI v2.70 by EDK II Dec 13 14:20:15.101895 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:20:15.101911 kernel: random: crng init done Dec 13 14:20:15.101927 kernel: SMBIOS 2.4 present. Dec 13 14:20:15.101945 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:20:15.101961 kernel: Hypervisor detected: KVM Dec 13 14:20:15.101988 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:20:15.102003 kernel: kvm-clock: cpu 0, msr 1b819a001, primary cpu clock Dec 13 14:20:15.102018 kernel: kvm-clock: using sched offset of 13105143036 cycles Dec 13 14:20:15.102032 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:20:15.102047 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:20:15.102061 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:20:15.102075 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:20:15.102089 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:20:15.102108 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:20:15.102121 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:20:15.102136 kernel: Using GB pages for direct mapping Dec 13 14:20:15.102150 kernel: Secure boot disabled Dec 13 14:20:15.102164 kernel: ACPI: Early table checksum verification disabled Dec 13 14:20:15.102179 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:20:15.102194 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:20:15.102210 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:20:15.102234 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:20:15.102250 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:20:15.102267 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:20:15.102283 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:20:15.102298 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:20:15.102313 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:20:15.102354 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:20:15.102393 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:20:15.102409 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:20:15.102425 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:20:15.102442 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:20:15.102459 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:20:15.102475 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:20:15.102491 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:20:15.102508 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:20:15.102528 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:20:15.102561 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:20:15.102578 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:20:15.102594 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:20:15.102611 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:20:15.102627 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:20:15.102644 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:20:15.102660 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:20:15.102678 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:20:15.102699 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:20:15.102719 kernel: Zone ranges: Dec 13 14:20:15.102735 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:20:15.102751 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:20:15.102768 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:20:15.102784 kernel: Movable zone start for each node Dec 13 14:20:15.102801 kernel: Early memory node ranges Dec 13 14:20:15.102817 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:20:15.102834 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:20:15.102854 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:20:15.102870 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:20:15.102884 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:20:15.102900 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:20:15.102915 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:20:15.102932 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:20:15.102948 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:20:15.102965 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:20:15.102991 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:20:15.103012 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:20:15.103028 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:20:15.103045 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:20:15.103061 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:20:15.103077 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:20:15.103094 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:20:15.103111 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:20:15.103128 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:20:15.103144 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:20:15.103164 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:20:15.103181 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:20:15.103198 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:20:15.103214 kernel: Booting paravirtualized kernel on KVM Dec 13 14:20:15.103230 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:20:15.103246 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:20:15.103261 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:20:15.103278 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:20:15.103294 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:20:15.103314 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:20:15.103331 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:20:15.103347 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:20:15.103409 kernel: Policy zone: Normal Dec 13 14:20:15.103431 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:20:15.103448 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:20:15.103464 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:20:15.103482 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:20:15.103498 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:20:15.103519 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:20:15.103536 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:20:15.103553 kernel: Kernel/User page tables isolation: enabled Dec 13 14:20:15.103569 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:20:15.103585 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:20:15.103600 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:20:15.103615 kernel: rcu: RCU event tracing is enabled. Dec 13 14:20:15.103631 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:20:15.103652 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:20:15.103682 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:20:15.103700 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:20:15.103722 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:20:15.103739 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:20:15.103757 kernel: Console: colour dummy device 80x25 Dec 13 14:20:15.103775 kernel: printk: console [ttyS0] enabled Dec 13 14:20:15.103792 kernel: ACPI: Core revision 20210730 Dec 13 14:20:15.103810 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:20:15.103829 kernel: x2apic enabled Dec 13 14:20:15.103850 kernel: Switched APIC routing to physical x2apic. Dec 13 14:20:15.103868 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:20:15.103886 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:20:15.103903 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:20:15.103921 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:20:15.103938 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:20:15.103956 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:20:15.103986 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:20:15.104004 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:20:15.104021 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:20:15.104038 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:20:15.104055 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:20:15.104073 kernel: RETBleed: Mitigation: IBRS Dec 13 14:20:15.104090 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:20:15.104108 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:20:15.104126 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:20:15.104147 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:20:15.104165 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:20:15.104183 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:20:15.104201 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:20:15.104218 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:20:15.104236 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:20:15.104254 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:20:15.104271 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:20:15.104289 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:20:15.104310 kernel: LSM: Security Framework initializing Dec 13 14:20:15.104328 kernel: SELinux: Initializing. Dec 13 14:20:15.104346 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:20:15.104386 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:20:15.104404 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:20:15.104422 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:20:15.104448 kernel: signal: max sigframe size: 1776 Dec 13 14:20:15.104471 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:20:15.104489 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:20:15.104510 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:20:15.104528 kernel: x86: Booting SMP configuration: Dec 13 14:20:15.104545 kernel: .... node #0, CPUs: #1 Dec 13 14:20:15.104563 kernel: kvm-clock: cpu 1, msr 1b819a041, secondary cpu clock Dec 13 14:20:15.104582 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:20:15.104601 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:20:15.104619 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:20:15.104637 kernel: smpboot: Max logical packages: 1 Dec 13 14:20:15.104659 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:20:15.104677 kernel: devtmpfs: initialized Dec 13 14:20:15.104694 kernel: x86/mm: Memory block size: 128MB Dec 13 14:20:15.104712 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:20:15.104730 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:20:15.104748 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:20:15.104765 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:20:15.104783 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:20:15.104801 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:20:15.104823 kernel: audit: type=2000 audit(1734099614.247:1): state=initialized audit_enabled=0 res=1 Dec 13 14:20:15.104841 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:20:15.104859 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:20:15.104877 kernel: cpuidle: using governor menu Dec 13 14:20:15.104894 kernel: ACPI: bus type PCI registered Dec 13 14:20:15.104912 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:20:15.104927 kernel: dca service started, version 1.12.1 Dec 13 14:20:15.104944 kernel: PCI: Using configuration type 1 for base access Dec 13 14:20:15.104962 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:20:15.104992 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:20:15.105010 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:20:15.105028 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:20:15.105044 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:20:15.105062 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:20:15.105079 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:20:15.105096 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:20:15.105114 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:20:15.105132 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:20:15.105153 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:20:15.105170 kernel: ACPI: Interpreter enabled Dec 13 14:20:15.105188 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:20:15.105206 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:20:15.105223 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:20:15.105240 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:20:15.105258 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:20:15.105520 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:20:15.105697 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:20:15.105719 kernel: PCI host bridge to bus 0000:00 Dec 13 14:20:15.105890 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:20:15.106062 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:20:15.106211 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:20:15.106375 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:20:15.106529 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:20:15.106714 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:20:15.106883 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:20:15.107066 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:20:15.107224 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:20:15.107420 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:20:15.107592 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:20:15.107766 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:20:15.107985 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:20:15.108148 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:20:15.108308 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:20:15.108502 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:20:15.108669 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:20:15.108833 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:20:15.108862 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:20:15.108881 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:20:15.108899 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:20:15.108916 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:20:15.108934 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:20:15.108952 kernel: iommu: Default domain type: Translated Dec 13 14:20:15.108969 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:20:15.108996 kernel: vgaarb: loaded Dec 13 14:20:15.109013 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:20:15.109034 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:20:15.109052 kernel: PTP clock support registered Dec 13 14:20:15.109070 kernel: Registered efivars operations Dec 13 14:20:15.109087 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:20:15.109105 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:20:15.109121 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:20:15.109138 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:20:15.109155 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:20:15.109173 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:20:15.109193 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:20:15.109210 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:20:15.109227 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:20:15.109244 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:20:15.109262 kernel: pnp: PnP ACPI init Dec 13 14:20:15.109279 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:20:15.109297 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:20:15.109315 kernel: NET: Registered PF_INET protocol family Dec 13 14:20:15.109333 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:20:15.109353 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:20:15.109441 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:20:15.109459 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:20:15.109476 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:20:15.109493 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:20:15.109511 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:20:15.109528 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:20:15.109545 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:20:15.109567 kernel: NET: Registered PF_XDP protocol family Dec 13 14:20:15.109727 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:20:15.109874 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:20:15.110029 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:20:15.110173 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:20:15.110339 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:20:15.110376 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:20:15.110400 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:20:15.110419 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:20:15.110437 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:20:15.110455 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:20:15.110473 kernel: clocksource: Switched to clocksource tsc Dec 13 14:20:15.110491 kernel: Initialise system trusted keyrings Dec 13 14:20:15.110507 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:20:15.110525 kernel: Key type asymmetric registered Dec 13 14:20:15.110542 kernel: Asymmetric key parser 'x509' registered Dec 13 14:20:15.110563 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:20:15.110580 kernel: io scheduler mq-deadline registered Dec 13 14:20:15.110597 kernel: io scheduler kyber registered Dec 13 14:20:15.110615 kernel: io scheduler bfq registered Dec 13 14:20:15.110632 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:20:15.110651 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:20:15.110820 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:20:15.110843 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:20:15.111014 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:20:15.111041 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:20:15.111204 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:20:15.111227 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:20:15.111244 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:20:15.111263 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:20:15.111280 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:20:15.111297 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:20:15.111492 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:20:15.111522 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:20:15.111540 kernel: i8042: Warning: Keylock active Dec 13 14:20:15.111556 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:20:15.111574 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:20:15.111749 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:20:15.111900 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:20:15.112061 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:20:14 UTC (1734099614) Dec 13 14:20:15.112209 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:20:15.112235 kernel: intel_pstate: CPU model not supported Dec 13 14:20:15.112253 kernel: pstore: Registered efi as persistent store backend Dec 13 14:20:15.112271 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:20:15.112289 kernel: Segment Routing with IPv6 Dec 13 14:20:15.112306 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:20:15.112324 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:20:15.112341 kernel: Key type dns_resolver registered Dec 13 14:20:15.112380 kernel: IPI shorthand broadcast: enabled Dec 13 14:20:15.112398 kernel: sched_clock: Marking stable (758082297, 161407752)->(1028475167, -108985118) Dec 13 14:20:15.112420 kernel: registered taskstats version 1 Dec 13 14:20:15.112437 kernel: Loading compiled-in X.509 certificates Dec 13 14:20:15.112454 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:20:15.112472 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:20:15.112490 kernel: Key type .fscrypt registered Dec 13 14:20:15.112507 kernel: Key type fscrypt-provisioning registered Dec 13 14:20:15.112525 kernel: pstore: Using crash dump compression: deflate Dec 13 14:20:15.112543 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:20:15.112560 kernel: ima: No architecture policies found Dec 13 14:20:15.112581 kernel: clk: Disabling unused clocks Dec 13 14:20:15.112599 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:20:15.112616 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:20:15.112633 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:20:15.112651 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:20:15.112668 kernel: Run /init as init process Dec 13 14:20:15.112686 kernel: with arguments: Dec 13 14:20:15.112703 kernel: /init Dec 13 14:20:15.112720 kernel: with environment: Dec 13 14:20:15.112740 kernel: HOME=/ Dec 13 14:20:15.112758 kernel: TERM=linux Dec 13 14:20:15.112775 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:20:15.112797 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:20:15.112819 systemd[1]: Detected virtualization kvm. Dec 13 14:20:15.112838 systemd[1]: Detected architecture x86-64. Dec 13 14:20:15.112856 systemd[1]: Running in initrd. Dec 13 14:20:15.112877 systemd[1]: No hostname configured, using default hostname. Dec 13 14:20:15.112895 systemd[1]: Hostname set to . Dec 13 14:20:15.112914 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:20:15.112933 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:20:15.112951 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:20:15.112969 systemd[1]: Reached target cryptsetup.target. Dec 13 14:20:15.112994 systemd[1]: Reached target paths.target. Dec 13 14:20:15.113011 systemd[1]: Reached target slices.target. Dec 13 14:20:15.113032 systemd[1]: Reached target swap.target. Dec 13 14:20:15.113050 systemd[1]: Reached target timers.target. Dec 13 14:20:15.113070 systemd[1]: Listening on iscsid.socket. Dec 13 14:20:15.113088 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:20:15.113105 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:20:15.113124 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:20:15.113142 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:20:15.113160 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:20:15.113181 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:20:15.113201 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:20:15.113237 systemd[1]: Reached target sockets.target. Dec 13 14:20:15.113260 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:20:15.113279 systemd[1]: Finished network-cleanup.service. Dec 13 14:20:15.113298 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:20:15.113321 systemd[1]: Starting systemd-journald.service... Dec 13 14:20:15.113339 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:20:15.113370 systemd[1]: Starting systemd-resolved.service... Dec 13 14:20:15.113403 systemd-journald[190]: Journal started Dec 13 14:20:15.113492 systemd-journald[190]: Runtime Journal (/run/log/journal/e3e99df211c281714f4a66c27f5a7b34) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:20:15.120392 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:20:15.126380 systemd[1]: Started systemd-journald.service. Dec 13 14:20:15.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.129411 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:20:15.134776 kernel: audit: type=1130 audit(1734099615.127:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.136971 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:20:15.149486 kernel: audit: type=1130 audit(1734099615.135:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.149520 kernel: audit: type=1130 audit(1734099615.139:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.140669 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:20:15.146053 systemd-modules-load[191]: Inserted module 'overlay' Dec 13 14:20:15.167679 kernel: audit: type=1130 audit(1734099615.156:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.158860 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:20:15.165585 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:20:15.188493 kernel: audit: type=1130 audit(1734099615.182:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.183767 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:20:15.189474 systemd-resolved[192]: Positive Trust Anchors: Dec 13 14:20:15.189913 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:20:15.190088 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:20:15.197690 systemd-resolved[192]: Defaulting to hostname 'linux'. Dec 13 14:20:15.199508 systemd[1]: Started systemd-resolved.service. Dec 13 14:20:15.199668 systemd[1]: Reached target nss-lookup.target. Dec 13 14:20:15.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.205383 kernel: audit: type=1130 audit(1734099615.198:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.212725 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:20:15.218382 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:20:15.227503 kernel: audit: type=1130 audit(1734099615.215:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.237384 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:20:15.240468 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:20:15.247493 kernel: Bridge firewalling registered Dec 13 14:20:15.247533 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:20:15.246053 systemd-modules-load[191]: Inserted module 'br_netfilter' Dec 13 14:20:15.282390 kernel: SCSI subsystem initialized Dec 13 14:20:15.302266 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:20:15.302349 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:20:15.304379 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:20:15.309051 systemd-modules-load[191]: Inserted module 'dm_multipath' Dec 13 14:20:15.310066 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:20:15.322622 kernel: audit: type=1130 audit(1734099615.315:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.323076 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:20:15.336440 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:20:15.349548 kernel: audit: type=1130 audit(1734099615.339:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.351389 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:20:15.372386 kernel: iscsi: registered transport (tcp) Dec 13 14:20:15.399401 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:20:15.399485 kernel: QLogic iSCSI HBA Driver Dec 13 14:20:15.444190 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:20:15.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.445862 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:20:15.504449 kernel: raid6: avx2x4 gen() 18057 MB/s Dec 13 14:20:15.521393 kernel: raid6: avx2x4 xor() 6770 MB/s Dec 13 14:20:15.538399 kernel: raid6: avx2x2 gen() 18020 MB/s Dec 13 14:20:15.555425 kernel: raid6: avx2x2 xor() 18464 MB/s Dec 13 14:20:15.572402 kernel: raid6: avx2x1 gen() 13918 MB/s Dec 13 14:20:15.589404 kernel: raid6: avx2x1 xor() 16075 MB/s Dec 13 14:20:15.606409 kernel: raid6: sse2x4 gen() 10999 MB/s Dec 13 14:20:15.623401 kernel: raid6: sse2x4 xor() 6640 MB/s Dec 13 14:20:15.640398 kernel: raid6: sse2x2 gen() 12019 MB/s Dec 13 14:20:15.657436 kernel: raid6: sse2x2 xor() 7387 MB/s Dec 13 14:20:15.674409 kernel: raid6: sse2x1 gen() 10401 MB/s Dec 13 14:20:15.691958 kernel: raid6: sse2x1 xor() 5155 MB/s Dec 13 14:20:15.692005 kernel: raid6: using algorithm avx2x4 gen() 18057 MB/s Dec 13 14:20:15.692028 kernel: raid6: .... xor() 6770 MB/s, rmw enabled Dec 13 14:20:15.692717 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:20:15.708405 kernel: xor: automatically using best checksumming function avx Dec 13 14:20:15.815638 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:20:15.826837 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:20:15.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.826000 audit: BPF prog-id=7 op=LOAD Dec 13 14:20:15.826000 audit: BPF prog-id=8 op=LOAD Dec 13 14:20:15.828588 systemd[1]: Starting systemd-udevd.service... Dec 13 14:20:15.846544 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 14:20:15.854213 systemd[1]: Started systemd-udevd.service. Dec 13 14:20:15.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.856647 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:20:15.881236 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Dec 13 14:20:15.921876 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:20:15.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.923063 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:20:15.990140 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:20:15.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:16.089388 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:20:16.106390 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:20:16.120173 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:20:16.120242 kernel: AES CTR mode by8 optimization enabled Dec 13 14:20:16.135385 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:20:16.237882 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:20:16.296526 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:20:16.296696 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:20:16.296833 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:20:16.296970 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:20:16.297104 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:20:16.297130 kernel: GPT:17805311 != 25165823 Dec 13 14:20:16.297151 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:20:16.297164 kernel: GPT:17805311 != 25165823 Dec 13 14:20:16.297177 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:20:16.297190 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:20:16.297204 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:20:16.347586 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:20:16.366541 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (437) Dec 13 14:20:16.381288 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:20:16.400530 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:20:16.400775 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:20:16.431246 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:20:16.439788 systemd[1]: Starting disk-uuid.service... Dec 13 14:20:16.470496 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:20:16.470712 disk-uuid[521]: Primary Header is updated. Dec 13 14:20:16.470712 disk-uuid[521]: Secondary Entries is updated. Dec 13 14:20:16.470712 disk-uuid[521]: Secondary Header is updated. Dec 13 14:20:16.496379 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:20:16.524401 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:20:17.512385 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:20:17.512858 disk-uuid[522]: The operation has completed successfully. Dec 13 14:20:17.583532 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:20:17.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:17.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:17.583684 systemd[1]: Finished disk-uuid.service. Dec 13 14:20:17.594251 systemd[1]: Starting verity-setup.service... Dec 13 14:20:17.622543 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:20:17.703587 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:20:17.712817 systemd[1]: Finished verity-setup.service. Dec 13 14:20:17.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:17.728734 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:20:17.830121 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:20:17.829944 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:20:17.837876 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:20:17.838880 systemd[1]: Starting ignition-setup.service... Dec 13 14:20:17.896293 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:20:17.896335 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:20:17.896375 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:20:17.896397 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:20:17.885588 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:20:17.915562 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:20:17.934482 systemd[1]: Finished ignition-setup.service. Dec 13 14:20:17.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:17.943910 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:20:18.006137 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:20:18.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.014000 audit: BPF prog-id=9 op=LOAD Dec 13 14:20:18.016471 systemd[1]: Starting systemd-networkd.service... Dec 13 14:20:18.050976 systemd-networkd[696]: lo: Link UP Dec 13 14:20:18.050991 systemd-networkd[696]: lo: Gained carrier Dec 13 14:20:18.051972 systemd-networkd[696]: Enumeration completed Dec 13 14:20:18.052112 systemd[1]: Started systemd-networkd.service. Dec 13 14:20:18.052508 systemd-networkd[696]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:20:18.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.054781 systemd-networkd[696]: eth0: Link UP Dec 13 14:20:18.054788 systemd-networkd[696]: eth0: Gained carrier Dec 13 14:20:18.064509 systemd-networkd[696]: eth0: DHCPv4 address 10.128.0.72/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:20:18.086829 systemd[1]: Reached target network.target. Dec 13 14:20:18.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.106747 systemd[1]: Starting iscsiuio.service... Dec 13 14:20:18.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.176597 iscsid[705]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:20:18.176597 iscsid[705]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:20:18.176597 iscsid[705]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:20:18.176597 iscsid[705]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:20:18.176597 iscsid[705]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:20:18.176597 iscsid[705]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:20:18.176597 iscsid[705]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:20:18.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.127713 systemd[1]: Started iscsiuio.service. Dec 13 14:20:18.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.231090 ignition[634]: Ignition 2.14.0 Dec 13 14:20:18.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.149044 systemd[1]: Starting iscsid.service... Dec 13 14:20:18.231103 ignition[634]: Stage: fetch-offline Dec 13 14:20:18.161694 systemd[1]: Started iscsid.service. Dec 13 14:20:18.231178 ignition[634]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:18.169829 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:20:18.231219 ignition[634]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:18.190048 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:20:18.253525 ignition[634]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:18.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.203888 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:20:18.253745 ignition[634]: parsed url from cmdline: "" Dec 13 14:20:18.257635 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:20:18.253753 ignition[634]: no config URL provided Dec 13 14:20:18.265670 systemd[1]: Reached target remote-fs.target. Dec 13 14:20:18.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.253760 ignition[634]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:20:18.283846 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:20:18.253772 ignition[634]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:20:18.307912 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:20:18.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.253782 ignition[634]: failed to fetch config: resource requires networking Dec 13 14:20:18.327957 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:20:18.254212 ignition[634]: Ignition finished successfully Dec 13 14:20:18.343847 systemd[1]: Starting ignition-fetch.service... Dec 13 14:20:18.356606 ignition[720]: Ignition 2.14.0 Dec 13 14:20:18.372290 unknown[720]: fetched base config from "system" Dec 13 14:20:18.356617 ignition[720]: Stage: fetch Dec 13 14:20:18.372451 unknown[720]: fetched base config from "system" Dec 13 14:20:18.356757 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:18.372470 unknown[720]: fetched user config from "gcp" Dec 13 14:20:18.356784 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:18.394149 systemd[1]: Finished ignition-fetch.service. Dec 13 14:20:18.363302 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:18.410175 systemd[1]: Starting ignition-kargs.service... Dec 13 14:20:18.363571 ignition[720]: parsed url from cmdline: "" Dec 13 14:20:18.446048 systemd[1]: Finished ignition-kargs.service. Dec 13 14:20:18.363578 ignition[720]: no config URL provided Dec 13 14:20:18.454006 systemd[1]: Starting ignition-disks.service... Dec 13 14:20:18.363588 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:20:18.490977 systemd[1]: Finished ignition-disks.service. Dec 13 14:20:18.363605 ignition[720]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:20:18.498946 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:20:18.363787 ignition[720]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:20:18.520576 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:20:18.368066 ignition[720]: GET result: OK Dec 13 14:20:18.520691 systemd[1]: Reached target local-fs.target. Dec 13 14:20:18.368141 ignition[720]: parsing config with SHA512: 762745d9db0cc447fb4aeeb8f13a2b1d1a944af0199c7f670c187940cc32a39f9603ca15efd80851cc0fad33ad02e82cb0f3f47bf7a3f16c208bc0fa21a50682 Dec 13 14:20:18.549673 systemd[1]: Reached target sysinit.target. Dec 13 14:20:18.374547 ignition[720]: fetch: fetch complete Dec 13 14:20:18.569662 systemd[1]: Reached target basic.target. Dec 13 14:20:18.374561 ignition[720]: fetch: fetch passed Dec 13 14:20:18.576926 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:20:18.374651 ignition[720]: Ignition finished successfully Dec 13 14:20:18.424025 ignition[726]: Ignition 2.14.0 Dec 13 14:20:18.424034 ignition[726]: Stage: kargs Dec 13 14:20:18.424173 ignition[726]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:18.424204 ignition[726]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:18.432003 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:18.433410 ignition[726]: kargs: kargs passed Dec 13 14:20:18.433464 ignition[726]: Ignition finished successfully Dec 13 14:20:18.466610 ignition[732]: Ignition 2.14.0 Dec 13 14:20:18.466618 ignition[732]: Stage: disks Dec 13 14:20:18.466768 ignition[732]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:18.466800 ignition[732]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:18.476320 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:18.477750 ignition[732]: disks: disks passed Dec 13 14:20:18.477802 ignition[732]: Ignition finished successfully Dec 13 14:20:18.620106 systemd-fsck[740]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:20:18.810328 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:20:18.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:18.811536 systemd[1]: Mounting sysroot.mount... Dec 13 14:20:18.839405 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:20:18.847791 systemd[1]: Mounted sysroot.mount. Dec 13 14:20:18.854738 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:20:18.874555 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:20:18.880269 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:20:18.880321 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:20:18.880355 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:20:18.969583 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (746) Dec 13 14:20:18.969625 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:20:18.969648 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:20:18.969670 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:20:18.901910 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:20:18.925926 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:20:19.002532 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:20:19.002573 initrd-setup-root[751]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:20:18.951207 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:20:19.030556 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:20:19.002640 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:20:19.046635 initrd-setup-root[785]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:20:19.057552 initrd-setup-root[793]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:20:19.083965 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:20:19.123578 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:20:19.123630 kernel: audit: type=1130 audit(1734099619.082:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.085521 systemd[1]: Starting ignition-mount.service... Dec 13 14:20:19.131663 systemd[1]: Starting sysroot-boot.service... Dec 13 14:20:19.145686 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:20:19.145803 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:20:19.171524 ignition[811]: INFO : Ignition 2.14.0 Dec 13 14:20:19.171524 ignition[811]: INFO : Stage: mount Dec 13 14:20:19.171524 ignition[811]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:19.171524 ignition[811]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:19.266558 kernel: audit: type=1130 audit(1734099619.184:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.266617 kernel: audit: type=1130 audit(1734099619.220:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:19.178105 systemd[1]: Finished sysroot-boot.service. Dec 13 14:20:19.280557 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:19.280557 ignition[811]: INFO : mount: mount passed Dec 13 14:20:19.280557 ignition[811]: INFO : Ignition finished successfully Dec 13 14:20:19.347575 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (822) Dec 13 14:20:19.347620 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:20:19.347644 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:20:19.347667 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:20:19.347690 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:20:19.186077 systemd[1]: Finished ignition-mount.service. Dec 13 14:20:19.223151 systemd[1]: Starting ignition-files.service... Dec 13 14:20:19.277726 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:20:19.379556 ignition[841]: INFO : Ignition 2.14.0 Dec 13 14:20:19.379556 ignition[841]: INFO : Stage: files Dec 13 14:20:19.379556 ignition[841]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:19.379556 ignition[841]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:19.379556 ignition[841]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:19.379556 ignition[841]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:20:19.456529 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (843) Dec 13 14:20:19.341201 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:20:19.465553 ignition[841]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:20:19.465553 ignition[841]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:20:19.465553 ignition[841]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:20:19.465553 ignition[841]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:20:19.465553 ignition[841]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3071501200" Dec 13 14:20:19.465553 ignition[841]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3071501200": device or resource busy Dec 13 14:20:19.465553 ignition[841]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3071501200", trying btrfs: device or resource busy Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3071501200" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3071501200" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3071501200" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3071501200" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:20:19.465553 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:20:19.391749 unknown[841]: wrote ssh authorized keys file for user: core Dec 13 14:20:19.733520 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 14:20:19.851550 systemd-networkd[696]: eth0: Gained IPv6LL Dec 13 14:20:20.705682 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4100099327" Dec 13 14:20:20.722536 ignition[841]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4100099327": device or resource busy Dec 13 14:20:20.722536 ignition[841]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4100099327", trying btrfs: device or resource busy Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4100099327" Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4100099327" Dec 13 14:20:20.722536 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem4100099327" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem4100099327" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:20:20.863543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:20:20.722979 systemd[1]: mnt-oem4100099327.mount: Deactivated successfully. Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3477390794" Dec 13 14:20:21.115543 ignition[841]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3477390794": device or resource busy Dec 13 14:20:21.115543 ignition[841]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3477390794", trying btrfs: device or resource busy Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3477390794" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3477390794" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3477390794" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3477390794" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:20:21.115543 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3357934317" Dec 13 14:20:21.115543 ignition[841]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3357934317": device or resource busy Dec 13 14:20:21.115543 ignition[841]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3357934317", trying btrfs: device or resource busy Dec 13 14:20:20.754096 systemd[1]: mnt-oem3477390794.mount: Deactivated successfully. Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3357934317" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3357934317" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem3357934317" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem3357934317" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:20:21.373565 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 14:20:21.541376 ignition[841]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:20:21.541376 ignition[841]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:20:21.597574 kernel: audit: type=1130 audit(1734099621.558:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:20:21.597725 ignition[841]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:20:21.597725 ignition[841]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:20:21.597725 ignition[841]: INFO : files: files passed Dec 13 14:20:21.597725 ignition[841]: INFO : Ignition finished successfully Dec 13 14:20:22.104585 kernel: audit: type=1130 audit(1734099621.635:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.104643 kernel: audit: type=1130 audit(1734099621.675:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.104666 kernel: audit: type=1131 audit(1734099621.675:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.104690 kernel: audit: type=1130 audit(1734099621.794:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.104713 kernel: audit: type=1131 audit(1734099621.794:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.104728 kernel: audit: type=1130 audit(1734099621.907:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.550527 systemd[1]: Finished ignition-files.service. Dec 13 14:20:21.569310 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:20:22.137573 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:20:21.606659 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:20:21.607798 systemd[1]: Starting ignition-quench.service... Dec 13 14:20:21.620032 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:20:21.637131 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:20:21.637303 systemd[1]: Finished ignition-quench.service. Dec 13 14:20:21.676963 systemd[1]: Reached target ignition-complete.target. Dec 13 14:20:22.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.735804 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:20:21.773490 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:20:22.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.773640 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:20:22.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.795802 systemd[1]: Reached target initrd-fs.target. Dec 13 14:20:22.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.852773 systemd[1]: Reached target initrd.target. Dec 13 14:20:22.332553 ignition[879]: INFO : Ignition 2.14.0 Dec 13 14:20:22.332553 ignition[879]: INFO : Stage: umount Dec 13 14:20:22.332553 ignition[879]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:20:22.332553 ignition[879]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:20:21.869788 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:20:22.407670 iscsid[705]: iscsid shutting down. Dec 13 14:20:22.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.422802 ignition[879]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:20:22.422802 ignition[879]: INFO : umount: umount passed Dec 13 14:20:22.422802 ignition[879]: INFO : Ignition finished successfully Dec 13 14:20:22.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.871085 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:20:22.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.889964 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:20:22.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.910203 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:20:22.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.955411 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:20:22.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.963892 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:20:22.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.983923 systemd[1]: Stopped target timers.target. Dec 13 14:20:22.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.003884 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:20:22.004071 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:20:22.041019 systemd[1]: Stopped target initrd.target. Dec 13 14:20:22.055866 systemd[1]: Stopped target basic.target. Dec 13 14:20:22.076918 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:20:22.089931 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:20:22.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.112841 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:20:22.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.127852 systemd[1]: Stopped target remote-fs.target. Dec 13 14:20:22.145859 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:20:22.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.167873 systemd[1]: Stopped target sysinit.target. Dec 13 14:20:22.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.192855 systemd[1]: Stopped target local-fs.target. Dec 13 14:20:22.207851 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:20:22.223837 systemd[1]: Stopped target swap.target. Dec 13 14:20:22.238763 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:20:22.238961 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:20:22.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.253956 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:20:22.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.784000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:20:22.269780 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:20:22.269976 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:20:22.279004 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:20:22.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.279206 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:20:22.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.303918 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:20:22.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.304096 systemd[1]: Stopped ignition-files.service. Dec 13 14:20:22.320451 systemd[1]: Stopping ignition-mount.service... Dec 13 14:20:22.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.354889 systemd[1]: Stopping iscsid.service... Dec 13 14:20:22.367191 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:20:22.396555 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:20:22.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.396830 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:20:22.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.415801 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:20:22.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.415977 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:20:22.434719 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:20:23.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.435920 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:20:23.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.436038 systemd[1]: Stopped iscsid.service. Dec 13 14:20:23.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.450249 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:20:23.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.450390 systemd[1]: Stopped ignition-mount.service. Dec 13 14:20:23.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:23.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:22.472294 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:20:22.472446 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:20:22.487452 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:20:22.487598 systemd[1]: Stopped ignition-disks.service. Dec 13 14:20:22.502646 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:20:23.144579 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Dec 13 14:20:22.502726 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:20:22.517631 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:20:22.517709 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:20:22.532651 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:20:22.532732 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:20:22.548628 systemd[1]: Stopped target paths.target. Dec 13 14:20:22.562540 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:20:22.566484 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:20:22.579568 systemd[1]: Stopped target slices.target. Dec 13 14:20:22.592558 systemd[1]: Stopped target sockets.target. Dec 13 14:20:22.605636 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:20:22.605720 systemd[1]: Closed iscsid.socket. Dec 13 14:20:22.620607 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:20:22.620703 systemd[1]: Stopped ignition-setup.service. Dec 13 14:20:22.636646 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:20:22.636723 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:20:22.652772 systemd[1]: Stopping iscsiuio.service... Dec 13 14:20:22.667917 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:20:22.668042 systemd[1]: Stopped iscsiuio.service. Dec 13 14:20:22.681950 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:20:22.682064 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:20:22.698628 systemd[1]: Stopped target network.target. Dec 13 14:20:22.712575 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:20:22.712655 systemd[1]: Closed iscsiuio.socket. Dec 13 14:20:22.726791 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:20:22.730444 systemd-networkd[696]: eth0: DHCPv6 lease lost Dec 13 14:20:22.740754 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:20:22.754868 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:20:22.754994 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:20:22.771239 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:20:22.771387 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:20:22.786229 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:20:22.786275 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:20:22.801758 systemd[1]: Stopping network-cleanup.service... Dec 13 14:20:22.815498 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:20:22.815621 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:20:22.830765 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:20:22.830842 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:20:22.848907 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:20:22.848974 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:20:22.864883 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:20:22.882156 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:20:22.882857 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:20:22.883008 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:20:22.896947 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:20:22.897039 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:20:22.910714 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:20:22.910769 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:20:22.925696 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:20:22.925771 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:20:22.940761 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:20:22.940833 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:20:22.958756 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:20:22.958826 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:20:22.976875 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:20:22.993530 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:20:22.993657 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:20:23.008767 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:20:23.008833 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:20:23.024631 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:20:23.024721 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:20:23.041966 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:20:23.042684 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:20:23.042794 systemd[1]: Stopped network-cleanup.service. Dec 13 14:20:23.055949 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:20:23.056066 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:20:23.075873 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:20:23.091596 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:20:23.107447 systemd[1]: Switching root. Dec 13 14:20:23.154716 systemd-journald[190]: Journal stopped Dec 13 14:20:27.783457 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:20:27.783588 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:20:27.783614 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:20:27.783637 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:20:27.783662 kernel: SELinux: policy capability open_perms=1 Dec 13 14:20:27.783693 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:20:27.783727 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:20:27.783749 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:20:27.783779 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:20:27.783801 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:20:27.783824 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:20:27.783847 systemd[1]: Successfully loaded SELinux policy in 110.090ms. Dec 13 14:20:27.783890 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.741ms. Dec 13 14:20:27.783919 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:20:27.783943 systemd[1]: Detected virtualization kvm. Dec 13 14:20:27.783966 systemd[1]: Detected architecture x86-64. Dec 13 14:20:27.783989 systemd[1]: Detected first boot. Dec 13 14:20:27.784013 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:20:27.784037 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:20:27.784061 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:20:27.784094 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:20:27.784121 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:20:27.784153 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:20:27.784185 kernel: kauditd_printk_skb: 52 callbacks suppressed Dec 13 14:20:27.784211 kernel: audit: type=1334 audit(1734099626.893:89): prog-id=12 op=LOAD Dec 13 14:20:27.784234 kernel: audit: type=1334 audit(1734099626.893:90): prog-id=3 op=UNLOAD Dec 13 14:20:27.784258 kernel: audit: type=1334 audit(1734099626.898:91): prog-id=13 op=LOAD Dec 13 14:20:27.784284 kernel: audit: type=1334 audit(1734099626.905:92): prog-id=14 op=LOAD Dec 13 14:20:27.784311 kernel: audit: type=1334 audit(1734099626.905:93): prog-id=4 op=UNLOAD Dec 13 14:20:27.784333 kernel: audit: type=1334 audit(1734099626.905:94): prog-id=5 op=UNLOAD Dec 13 14:20:27.784355 kernel: audit: type=1334 audit(1734099626.912:95): prog-id=15 op=LOAD Dec 13 14:20:27.784397 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:20:27.784421 kernel: audit: type=1334 audit(1734099626.912:96): prog-id=12 op=UNLOAD Dec 13 14:20:27.784444 kernel: audit: type=1334 audit(1734099626.919:97): prog-id=16 op=LOAD Dec 13 14:20:27.784466 kernel: audit: type=1334 audit(1734099626.926:98): prog-id=17 op=LOAD Dec 13 14:20:27.784490 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:20:27.784513 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:20:27.784544 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:20:27.784569 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:20:27.784592 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:20:27.786902 systemd[1]: Created slice system-getty.slice. Dec 13 14:20:27.786937 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:20:27.786962 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:20:27.786987 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:20:27.787013 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:20:27.787044 systemd[1]: Created slice user.slice. Dec 13 14:20:27.787069 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:20:27.787094 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:20:27.787119 systemd[1]: Set up automount boot.automount. Dec 13 14:20:27.787142 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:20:27.787166 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:20:27.787189 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:20:27.787213 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:20:27.787236 systemd[1]: Reached target integritysetup.target. Dec 13 14:20:27.787264 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:20:27.787288 systemd[1]: Reached target remote-fs.target. Dec 13 14:20:27.787311 systemd[1]: Reached target slices.target. Dec 13 14:20:27.787334 systemd[1]: Reached target swap.target. Dec 13 14:20:27.787373 systemd[1]: Reached target torcx.target. Dec 13 14:20:27.793438 systemd[1]: Reached target veritysetup.target. Dec 13 14:20:27.793497 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:20:27.793538 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:20:27.793562 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:20:27.793592 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:20:27.793615 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:20:27.793643 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:20:27.793666 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:20:27.793696 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:20:27.793718 systemd[1]: Mounting media.mount... Dec 13 14:20:27.793741 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:27.793762 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:20:27.793786 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:20:27.793813 systemd[1]: Mounting tmp.mount... Dec 13 14:20:27.793837 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:20:27.793864 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:20:27.793888 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:20:27.793912 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:20:27.793936 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:20:27.793960 systemd[1]: Starting modprobe@drm.service... Dec 13 14:20:27.793983 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:20:27.794006 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:20:27.794036 systemd[1]: Starting modprobe@loop.service... Dec 13 14:20:27.794060 kernel: fuse: init (API version 7.34) Dec 13 14:20:27.794084 kernel: loop: module loaded Dec 13 14:20:27.794109 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:20:27.794134 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:20:27.794158 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:20:27.794183 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:20:27.794207 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:20:27.794230 systemd[1]: Stopped systemd-journald.service. Dec 13 14:20:27.794257 systemd[1]: Starting systemd-journald.service... Dec 13 14:20:27.794278 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:20:27.794302 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:20:27.794326 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:20:27.794373 systemd-journald[1003]: Journal started Dec 13 14:20:27.794497 systemd-journald[1003]: Runtime Journal (/run/log/journal/e3e99df211c281714f4a66c27f5a7b34) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:20:23.153000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:20:23.451000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:20:23.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:20:23.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:20:23.609000 audit: BPF prog-id=10 op=LOAD Dec 13 14:20:23.609000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:20:23.609000 audit: BPF prog-id=11 op=LOAD Dec 13 14:20:23.609000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:20:23.769000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:20:23.769000 audit[912]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:23.769000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:20:23.779000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:20:23.779000 audit[912]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879b9 a2=1ed a3=0 items=2 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:23.779000 audit: CWD cwd="/" Dec 13 14:20:23.779000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:23.779000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:23.779000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:20:26.893000 audit: BPF prog-id=12 op=LOAD Dec 13 14:20:26.893000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:20:26.898000 audit: BPF prog-id=13 op=LOAD Dec 13 14:20:26.905000 audit: BPF prog-id=14 op=LOAD Dec 13 14:20:26.905000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:20:26.905000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:20:26.912000 audit: BPF prog-id=15 op=LOAD Dec 13 14:20:26.912000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:20:26.919000 audit: BPF prog-id=16 op=LOAD Dec 13 14:20:26.926000 audit: BPF prog-id=17 op=LOAD Dec 13 14:20:26.926000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:20:26.926000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:20:26.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.981000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:20:26.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.732000 audit: BPF prog-id=18 op=LOAD Dec 13 14:20:27.732000 audit: BPF prog-id=19 op=LOAD Dec 13 14:20:27.732000 audit: BPF prog-id=20 op=LOAD Dec 13 14:20:27.732000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:20:27.732000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:20:27.780000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:20:27.780000 audit[1003]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe628b9b80 a2=4000 a3=7ffe628b9c1c items=0 ppid=1 pid=1003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:27.780000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:20:26.892329 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:20:23.765598 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:20:26.928846 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:20:23.766852 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:20:23.766887 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:20:23.766945 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:20:23.766964 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:20:23.767034 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:20:23.767058 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:20:23.767423 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:20:23.767491 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:20:23.767515 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:20:23.769088 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:20:23.769157 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:20:23.769194 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:20:23.769222 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:20:23.769255 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:20:23.769283 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:20:26.286047 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:20:26.286341 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:20:26.286537 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:20:26.287234 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:20:26.287302 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:20:26.287389 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T14:20:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:20:27.807410 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:20:27.825881 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:20:27.827409 systemd[1]: Stopped verity-setup.service. Dec 13 14:20:27.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.847382 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:27.857017 systemd[1]: Started systemd-journald.service. Dec 13 14:20:27.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.866976 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:20:27.875737 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:20:27.882788 systemd[1]: Mounted media.mount. Dec 13 14:20:27.889748 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:20:27.898706 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:20:27.907681 systemd[1]: Mounted tmp.mount. Dec 13 14:20:27.914898 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:20:27.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.923946 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:20:27.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.932954 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:20:27.933183 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:20:27.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.942000 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:20:27.942224 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:20:27.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.950944 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:20:27.951162 systemd[1]: Finished modprobe@drm.service. Dec 13 14:20:27.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.959981 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:20:27.960192 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:20:27.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.968907 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:20:27.969118 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:20:27.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.977915 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:20:27.978121 systemd[1]: Finished modprobe@loop.service. Dec 13 14:20:27.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.986982 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:20:27.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:27.995900 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:20:28.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.004932 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:20:28.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.013926 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:20:28.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.023395 systemd[1]: Reached target network-pre.target. Dec 13 14:20:28.033159 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:20:28.043056 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:20:28.050569 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:20:28.054709 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:20:28.064597 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:20:28.073854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:20:28.074886 systemd-journald[1003]: Time spent on flushing to /var/log/journal/e3e99df211c281714f4a66c27f5a7b34 is 83.752ms for 1159 entries. Dec 13 14:20:28.074886 systemd-journald[1003]: System Journal (/var/log/journal/e3e99df211c281714f4a66c27f5a7b34) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:20:28.193796 systemd-journald[1003]: Received client request to flush runtime journal. Dec 13 14:20:28.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.075721 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:20:28.090609 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:20:28.092523 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:20:28.101423 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:20:28.110141 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:20:28.197308 udevadm[1017]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:20:28.120834 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:20:28.129673 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:20:28.138931 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:20:28.147958 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:20:28.161131 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:20:28.182710 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:20:28.191050 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:20:28.203409 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:20:28.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.247267 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:20:28.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.764401 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:20:28.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.772000 audit: BPF prog-id=21 op=LOAD Dec 13 14:20:28.772000 audit: BPF prog-id=22 op=LOAD Dec 13 14:20:28.772000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:20:28.772000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:20:28.774688 systemd[1]: Starting systemd-udevd.service... Dec 13 14:20:28.798827 systemd-udevd[1022]: Using default interface naming scheme 'v252'. Dec 13 14:20:28.852235 systemd[1]: Started systemd-udevd.service. Dec 13 14:20:28.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:28.862000 audit: BPF prog-id=23 op=LOAD Dec 13 14:20:28.864903 systemd[1]: Starting systemd-networkd.service... Dec 13 14:20:28.877000 audit: BPF prog-id=24 op=LOAD Dec 13 14:20:28.878000 audit: BPF prog-id=25 op=LOAD Dec 13 14:20:28.878000 audit: BPF prog-id=26 op=LOAD Dec 13 14:20:28.880603 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:20:28.930497 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:20:28.954255 systemd[1]: Started systemd-userdbd.service. Dec 13 14:20:28.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.052424 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:20:29.076388 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:20:29.100074 systemd-networkd[1032]: lo: Link UP Dec 13 14:20:29.100088 systemd-networkd[1032]: lo: Gained carrier Dec 13 14:20:29.100905 systemd-networkd[1032]: Enumeration completed Dec 13 14:20:29.101046 systemd[1]: Started systemd-networkd.service. Dec 13 14:20:29.101298 systemd-networkd[1032]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:20:29.103619 systemd-networkd[1032]: eth0: Link UP Dec 13 14:20:29.103636 systemd-networkd[1032]: eth0: Gained carrier Dec 13 14:20:29.080000 audit[1030]: AVC avc: denied { confidentiality } for pid=1030 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:20:29.080000 audit[1030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55abf4409c30 a1=337fc a2=7f44becd3bc5 a3=5 items=110 ppid=1022 pid=1030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:29.080000 audit: CWD cwd="/" Dec 13 14:20:29.080000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=1 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=2 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=3 name=(null) inode=13079 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=4 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=5 name=(null) inode=13080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=6 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=7 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=8 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=9 name=(null) inode=13082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=10 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=11 name=(null) inode=13083 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=12 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=13 name=(null) inode=13084 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=14 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=15 name=(null) inode=13085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=16 name=(null) inode=13081 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=17 name=(null) inode=13086 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=18 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=19 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=20 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=21 name=(null) inode=13088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=22 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=23 name=(null) inode=13089 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=24 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=25 name=(null) inode=13090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=26 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=27 name=(null) inode=13091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=28 name=(null) inode=13087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=29 name=(null) inode=13092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=30 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=31 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=32 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=33 name=(null) inode=13094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=34 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=35 name=(null) inode=13095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=36 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=37 name=(null) inode=13096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=38 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=39 name=(null) inode=13097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=40 name=(null) inode=13093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=41 name=(null) inode=13098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=42 name=(null) inode=13078 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=43 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=44 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=45 name=(null) inode=13100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=46 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=47 name=(null) inode=13101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=48 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=49 name=(null) inode=13102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=50 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=51 name=(null) inode=13103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=52 name=(null) inode=13099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=53 name=(null) inode=13104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=55 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=56 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=57 name=(null) inode=13106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=58 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=59 name=(null) inode=13107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=60 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=61 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=62 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=63 name=(null) inode=13109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=64 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=65 name=(null) inode=13110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=66 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=67 name=(null) inode=13111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=68 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=69 name=(null) inode=13112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=70 name=(null) inode=13108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=71 name=(null) inode=13113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=72 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=73 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=74 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=75 name=(null) inode=13115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=76 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=77 name=(null) inode=13116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=78 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=79 name=(null) inode=13117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=80 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=81 name=(null) inode=13118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=82 name=(null) inode=13114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=83 name=(null) inode=13119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=84 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=85 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=86 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=87 name=(null) inode=13121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=88 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=89 name=(null) inode=13122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=90 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=91 name=(null) inode=13123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=92 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=93 name=(null) inode=13124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=94 name=(null) inode=13120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=95 name=(null) inode=13125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=96 name=(null) inode=13105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=97 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=98 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=99 name=(null) inode=13127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=100 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=101 name=(null) inode=13128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=102 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=103 name=(null) inode=13129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=104 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=105 name=(null) inode=13130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=106 name=(null) inode=13126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=107 name=(null) inode=13131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PATH item=109 name=(null) inode=13132 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:20:29.080000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:20:29.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.115568 systemd-networkd[1032]: eth0: DHCPv4 address 10.128.0.72/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:20:29.131138 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:20:29.131264 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:20:29.168449 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:20:29.191440 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1033) Dec 13 14:20:29.205536 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:20:29.247388 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:20:29.260415 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:20:29.264789 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:20:29.288960 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:20:29.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.299198 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:20:29.327230 lvm[1059]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:20:29.360750 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:20:29.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.369801 systemd[1]: Reached target cryptsetup.target. Dec 13 14:20:29.380071 systemd[1]: Starting lvm2-activation.service... Dec 13 14:20:29.386113 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:20:29.418848 systemd[1]: Finished lvm2-activation.service. Dec 13 14:20:29.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.427812 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:20:29.436573 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:20:29.436641 systemd[1]: Reached target local-fs.target. Dec 13 14:20:29.445569 systemd[1]: Reached target machines.target. Dec 13 14:20:29.455146 systemd[1]: Starting ldconfig.service... Dec 13 14:20:29.463563 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:20:29.463656 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:29.465393 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:20:29.473977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:20:29.485334 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:20:29.487692 systemd[1]: Starting systemd-sysext.service... Dec 13 14:20:29.488658 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1062 (bootctl) Dec 13 14:20:29.491269 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:20:29.506267 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:20:29.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.524075 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:20:29.532528 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:20:29.532791 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:20:29.553402 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:20:29.650647 systemd-fsck[1072]: fsck.fat 4.2 (2021-01-31) Dec 13 14:20:29.650647 systemd-fsck[1072]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:20:29.651509 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:20:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.663625 systemd[1]: Mounting boot.mount... Dec 13 14:20:29.698511 systemd[1]: Mounted boot.mount. Dec 13 14:20:29.711212 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:20:29.712189 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:20:29.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.727727 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:20:29.742654 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:20:29.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.772466 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:20:29.797983 (sd-sysext)[1077]: Using extensions 'kubernetes'. Dec 13 14:20:29.798676 (sd-sysext)[1077]: Merged extensions into '/usr'. Dec 13 14:20:29.824711 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:29.827838 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:20:29.838831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:20:29.840963 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:20:29.850117 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:20:29.859134 systemd[1]: Starting modprobe@loop.service... Dec 13 14:20:29.867618 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:20:29.867863 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:29.868063 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:29.873278 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:20:29.881082 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:20:29.881296 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:20:29.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.890687 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:20:29.890906 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:20:29.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.901217 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:20:29.901455 systemd[1]: Finished modprobe@loop.service. Dec 13 14:20:29.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.912072 systemd[1]: Finished systemd-sysext.service. Dec 13 14:20:29.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:29.922500 systemd[1]: Starting ensure-sysext.service... Dec 13 14:20:29.929561 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:20:29.929673 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:20:29.932133 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:20:29.944441 systemd[1]: Reloading. Dec 13 14:20:29.952757 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:20:29.956199 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:20:29.961541 systemd-tmpfiles[1084]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:20:30.105312 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2024-12-13T14:20:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:20:30.107462 /usr/lib/systemd/system-generators/torcx-generator[1104]: time="2024-12-13T14:20:30Z" level=info msg="torcx already run" Dec 13 14:20:30.147003 ldconfig[1061]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:20:30.273549 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:20:30.273579 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:20:30.297670 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:20:30.372000 audit: BPF prog-id=27 op=LOAD Dec 13 14:20:30.372000 audit: BPF prog-id=28 op=LOAD Dec 13 14:20:30.372000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:20:30.372000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:20:30.376000 audit: BPF prog-id=29 op=LOAD Dec 13 14:20:30.376000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:20:30.377000 audit: BPF prog-id=30 op=LOAD Dec 13 14:20:30.377000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:20:30.377000 audit: BPF prog-id=31 op=LOAD Dec 13 14:20:30.377000 audit: BPF prog-id=32 op=LOAD Dec 13 14:20:30.377000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:20:30.377000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:20:30.379000 audit: BPF prog-id=33 op=LOAD Dec 13 14:20:30.379000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:20:30.379000 audit: BPF prog-id=34 op=LOAD Dec 13 14:20:30.379000 audit: BPF prog-id=35 op=LOAD Dec 13 14:20:30.380000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:20:30.380000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:20:30.385225 systemd[1]: Finished ldconfig.service. Dec 13 14:20:30.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.394475 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:20:30.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.409003 systemd[1]: Starting audit-rules.service... Dec 13 14:20:30.419393 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:20:30.427998 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:20:30.438989 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:20:30.447000 audit: BPF prog-id=36 op=LOAD Dec 13 14:20:30.450768 systemd[1]: Starting systemd-resolved.service... Dec 13 14:20:30.458000 audit: BPF prog-id=37 op=LOAD Dec 13 14:20:30.461714 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:20:30.470766 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:20:30.479477 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:20:30.478000 audit[1173]: SYSTEM_BOOT pid=1173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.489448 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:20:30.489703 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:20:30.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:30.503332 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:20:30.503000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:20:30.503000 audit[1178]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe38da3fa0 a2=420 a3=0 items=0 ppid=1148 pid=1178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:30.504848 augenrules[1178]: No rules Dec 13 14:20:30.503000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:20:30.514139 systemd[1]: Finished audit-rules.service. Dec 13 14:20:30.524998 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:20:30.531593 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:20:30.540967 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:20:30.550822 systemd[1]: Starting modprobe@loop.service... Dec 13 14:20:30.559749 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:20:30.566575 enable-oslogin[1186]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:20:30.568619 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:20:30.569008 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:30.572649 systemd[1]: Starting systemd-update-done.service... Dec 13 14:20:30.579679 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:20:30.587846 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:20:30.588473 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:20:30.599081 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:20:30.599803 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:20:30.610611 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:20:30.610853 systemd[1]: Finished modprobe@loop.service. Dec 13 14:20:30.618117 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:20:30.618976 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:20:30.629453 systemd[1]: Finished systemd-update-done.service. Dec 13 14:20:30.638949 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:30.639140 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:20:30.639316 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:20:30.639456 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:30.640652 systemd-resolved[1164]: Positive Trust Anchors: Dec 13 14:20:30.641030 systemd-resolved[1164]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:20:30.641187 systemd-resolved[1164]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:20:30.641557 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:20:30.652569 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:30.653033 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:20:30.655526 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:20:30.659927 systemd-resolved[1164]: Defaulting to hostname 'linux'. Dec 13 14:20:30.664767 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:20:30.673703 systemd[1]: Starting modprobe@loop.service... Dec 13 14:20:30.682713 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:20:30.690398 enable-oslogin[1191]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:20:30.691622 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:20:30.691899 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:30.692092 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:20:30.692249 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:20:30.694175 systemd[1]: Started systemd-resolved.service. Dec 13 14:20:30.703444 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:20:30.703697 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:20:30.713430 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:20:30.713657 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:20:31.192418 systemd-resolved[1164]: Clock change detected. Flushing caches. Dec 13 14:20:31.192582 systemd-timesyncd[1169]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:20:31.192659 systemd-timesyncd[1169]: Initial clock synchronization to Fri 2024-12-13 14:20:31.192368 UTC. Dec 13 14:20:31.195484 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:20:31.205313 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:20:31.205494 systemd[1]: Finished modprobe@loop.service. Dec 13 14:20:31.205751 systemd-networkd[1032]: eth0: Gained IPv6LL Dec 13 14:20:31.214828 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:20:31.215104 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:20:31.224978 systemd[1]: Reached target network.target. Dec 13 14:20:31.234318 systemd[1]: Reached target nss-lookup.target. Dec 13 14:20:31.243240 systemd[1]: Reached target time-set.target. Dec 13 14:20:31.252311 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:20:31.252615 systemd[1]: Reached target sysinit.target. Dec 13 14:20:31.261560 systemd[1]: Started motdgen.path. Dec 13 14:20:31.269344 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:20:31.279553 systemd[1]: Started logrotate.timer. Dec 13 14:20:31.287456 systemd[1]: Started mdadm.timer. Dec 13 14:20:31.294345 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:20:31.303234 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:20:31.303443 systemd[1]: Reached target paths.target. Dec 13 14:20:31.311252 systemd[1]: Reached target timers.target. Dec 13 14:20:31.318764 systemd[1]: Listening on dbus.socket. Dec 13 14:20:31.327995 systemd[1]: Starting docker.socket... Dec 13 14:20:31.339461 systemd[1]: Listening on sshd.socket. Dec 13 14:20:31.347344 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:31.347661 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:20:31.350664 systemd[1]: Listening on docker.socket. Dec 13 14:20:31.360771 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:20:31.361102 systemd[1]: Reached target sockets.target. Dec 13 14:20:31.369255 systemd[1]: Reached target basic.target. Dec 13 14:20:31.376326 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:20:31.376618 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:20:31.378780 systemd[1]: Starting containerd.service... Dec 13 14:20:31.388103 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:20:31.399099 systemd[1]: Starting dbus.service... Dec 13 14:20:31.408831 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:20:31.421730 systemd[1]: Starting extend-filesystems.service... Dec 13 14:20:31.425473 jq[1198]: false Dec 13 14:20:31.429062 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:20:31.431602 systemd[1]: Starting modprobe@drm.service... Dec 13 14:20:31.441240 systemd[1]: Starting motdgen.service... Dec 13 14:20:31.450707 systemd[1]: Starting prepare-helm.service... Dec 13 14:20:31.460279 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:20:31.469357 systemd[1]: Starting sshd-keygen.service... Dec 13 14:20:31.478319 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:20:31.487041 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:20:31.487332 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:20:31.488250 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:20:31.489936 systemd[1]: Starting update-engine.service... Dec 13 14:20:31.500248 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:20:31.506178 jq[1220]: true Dec 13 14:20:31.515191 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:20:31.515741 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:20:31.516613 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:20:31.517560 systemd[1]: Finished modprobe@drm.service. Dec 13 14:20:31.524430 extend-filesystems[1200]: Found loop1 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda1 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda2 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda3 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found usr Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda4 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda6 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda7 Dec 13 14:20:31.533376 extend-filesystems[1200]: Found sda9 Dec 13 14:20:31.631078 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:20:31.529932 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:20:31.571796 dbus-daemon[1197]: [system] SELinux support is enabled Dec 13 14:20:31.631710 extend-filesystems[1200]: Checking size of /dev/sda9 Dec 13 14:20:31.631710 extend-filesystems[1200]: Resized partition /dev/sda9 Dec 13 14:20:31.531942 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:20:31.584918 dbus-daemon[1197]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1032 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:20:31.661499 update_engine[1217]: I1213 14:20:31.647215 1217 main.cc:92] Flatcar Update Engine starting Dec 13 14:20:31.661499 update_engine[1217]: I1213 14:20:31.658681 1217 update_check_scheduler.cc:74] Next update check in 7m13s Dec 13 14:20:31.661848 extend-filesystems[1236]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:20:31.697049 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:20:31.534495 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:20:31.554143 systemd[1]: Reached target network-online.target. Dec 13 14:20:31.697534 jq[1227]: true Dec 13 14:20:31.577079 systemd[1]: Starting kubelet.service... Dec 13 14:20:31.595139 systemd[1]: Starting oem-gce.service... Dec 13 14:20:31.629376 systemd[1]: Starting systemd-logind.service... Dec 13 14:20:31.638698 systemd[1]: Started dbus.service. Dec 13 14:20:31.652435 systemd[1]: Finished ensure-sysext.service. Dec 13 14:20:31.675854 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:20:31.676159 systemd[1]: Finished motdgen.service. Dec 13 14:20:31.700203 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:20:31.700280 systemd[1]: Reached target system-config.target. Dec 13 14:20:31.702700 extend-filesystems[1236]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:20:31.702700 extend-filesystems[1236]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:20:31.702700 extend-filesystems[1236]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:20:31.792714 bash[1262]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:20:31.709255 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:20:31.793017 extend-filesystems[1200]: Resized filesystem in /dev/sda9 Dec 13 14:20:31.706524 dbus-daemon[1197]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:20:31.836735 env[1228]: time="2024-12-13T14:20:31.729617168Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:20:31.709294 systemd[1]: Reached target user-config.target. Dec 13 14:20:31.842186 tar[1223]: linux-amd64/helm Dec 13 14:20:31.842482 mkfs.ext4[1260]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:20:31.842482 mkfs.ext4[1260]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:20:31.842482 mkfs.ext4[1260]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:20:31.842482 mkfs.ext4[1260]: Filesystem UUID: 44fe2102-7b4c-4733-b8d6-4a77e3ad309a Dec 13 14:20:31.842482 mkfs.ext4[1260]: Superblock backups stored on blocks: Dec 13 14:20:31.842482 mkfs.ext4[1260]: 32768, 98304, 163840, 229376 Dec 13 14:20:31.842482 mkfs.ext4[1260]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:20:31.842482 mkfs.ext4[1260]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:20:31.842482 mkfs.ext4[1260]: Creating journal (8192 blocks): done Dec 13 14:20:31.842482 mkfs.ext4[1260]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:20:31.735568 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:20:31.735835 systemd[1]: Finished extend-filesystems.service. Dec 13 14:20:31.753023 systemd[1]: Started update-engine.service. Dec 13 14:20:31.781280 systemd[1]: Started locksmithd.service. Dec 13 14:20:31.802546 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:20:31.810672 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:20:31.845804 umount[1267]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:20:31.868406 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:20:31.917004 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:20:31.978205 systemd-logind[1240]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:20:31.978248 systemd-logind[1240]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:20:31.978281 systemd-logind[1240]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:20:31.982043 systemd-logind[1240]: New seat seat0. Dec 13 14:20:31.993538 systemd[1]: Started systemd-logind.service. Dec 13 14:20:32.032690 env[1228]: time="2024-12-13T14:20:32.032612834Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:20:32.032874 env[1228]: time="2024-12-13T14:20:32.032838076Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.044319 coreos-metadata[1196]: Dec 13 14:20:32.044 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:20:32.053989 env[1228]: time="2024-12-13T14:20:32.053924836Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:20:32.053989 env[1228]: time="2024-12-13T14:20:32.053984808Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.054623 env[1228]: time="2024-12-13T14:20:32.054343801Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:20:32.054733 env[1228]: time="2024-12-13T14:20:32.054635077Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.054733 env[1228]: time="2024-12-13T14:20:32.054662941Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:20:32.054733 env[1228]: time="2024-12-13T14:20:32.054681684Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.054872 env[1228]: time="2024-12-13T14:20:32.054808981Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.060101 coreos-metadata[1196]: Dec 13 14:20:32.060 INFO Fetch failed with 404: resource not found Dec 13 14:20:32.060218 coreos-metadata[1196]: Dec 13 14:20:32.060 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:20:32.065915 coreos-metadata[1196]: Dec 13 14:20:32.061 INFO Fetch successful Dec 13 14:20:32.065915 coreos-metadata[1196]: Dec 13 14:20:32.061 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:20:32.066375 env[1228]: time="2024-12-13T14:20:32.066336137Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:20:32.066661 env[1228]: time="2024-12-13T14:20:32.066610089Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:20:32.066778 env[1228]: time="2024-12-13T14:20:32.066662222Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:20:32.066842 env[1228]: time="2024-12-13T14:20:32.066765861Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:20:32.066842 env[1228]: time="2024-12-13T14:20:32.066789819Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:20:32.069977 coreos-metadata[1196]: Dec 13 14:20:32.069 INFO Fetch failed with 404: resource not found Dec 13 14:20:32.070090 coreos-metadata[1196]: Dec 13 14:20:32.069 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:20:32.070427 coreos-metadata[1196]: Dec 13 14:20:32.070 INFO Fetch failed with 404: resource not found Dec 13 14:20:32.070527 coreos-metadata[1196]: Dec 13 14:20:32.070 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:20:32.073317 coreos-metadata[1196]: Dec 13 14:20:32.073 INFO Fetch successful Dec 13 14:20:32.075983 unknown[1196]: wrote ssh authorized keys file for user: core Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104003546Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104136172Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104162448Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104236491Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104265065Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104354930Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104381458Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104429239Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104451322Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104491761Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104514878Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104537480Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104790357Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:20:32.105296 env[1228]: time="2024-12-13T14:20:32.104992037Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.105664388Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.105734181Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.105761343Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.105924856Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.106037434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.106063403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106106 env[1228]: time="2024-12-13T14:20:32.106085460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106420 env[1228]: time="2024-12-13T14:20:32.106124950Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106420 env[1228]: time="2024-12-13T14:20:32.106147734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106420 env[1228]: time="2024-12-13T14:20:32.106169783Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106420 env[1228]: time="2024-12-13T14:20:32.106209790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106420 env[1228]: time="2024-12-13T14:20:32.106237591Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106478037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106506087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106551374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106572936Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106629053Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:20:32.106665 env[1228]: time="2024-12-13T14:20:32.106652082Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:20:32.106963 env[1228]: time="2024-12-13T14:20:32.106701419Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:20:32.106963 env[1228]: time="2024-12-13T14:20:32.106754150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:20:32.107333 env[1228]: time="2024-12-13T14:20:32.107216899Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.107355244Z" level=info msg="Connect containerd service" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.107426003Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.108585783Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110592323Z" level=info msg="Start subscribing containerd event" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110667356Z" level=info msg="Start recovering state" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110762483Z" level=info msg="Start event monitor" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110791437Z" level=info msg="Start snapshots syncer" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110807932Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:20:32.111861 env[1228]: time="2024-12-13T14:20:32.110821082Z" level=info msg="Start streaming server" Dec 13 14:20:32.112910 env[1228]: time="2024-12-13T14:20:32.112230008Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:20:32.112910 env[1228]: time="2024-12-13T14:20:32.112394871Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:20:32.112653 systemd[1]: Started containerd.service. Dec 13 14:20:32.126971 update-ssh-keys[1275]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:20:32.127755 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:20:32.157283 env[1228]: time="2024-12-13T14:20:32.157232254Z" level=info msg="containerd successfully booted in 0.428690s" Dec 13 14:20:32.172914 dbus-daemon[1197]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:20:32.173121 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:20:32.173795 dbus-daemon[1197]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1265 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:20:32.187014 systemd[1]: Starting polkit.service... Dec 13 14:20:32.267101 polkitd[1276]: Started polkitd version 121 Dec 13 14:20:32.296411 polkitd[1276]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:20:32.297298 polkitd[1276]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:20:32.312701 polkitd[1276]: Finished loading, compiling and executing 2 rules Dec 13 14:20:32.313668 dbus-daemon[1197]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:20:32.313948 systemd[1]: Started polkit.service. Dec 13 14:20:32.316530 polkitd[1276]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:20:32.356261 systemd-hostnamed[1265]: Hostname set to (transient) Dec 13 14:20:32.360993 systemd-resolved[1164]: System hostname changed to 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal'. Dec 13 14:20:33.374473 tar[1223]: linux-amd64/LICENSE Dec 13 14:20:33.374473 tar[1223]: linux-amd64/README.md Dec 13 14:20:33.395493 systemd[1]: Finished prepare-helm.service. Dec 13 14:20:33.892270 systemd[1]: Started kubelet.service. Dec 13 14:20:34.253298 sshd_keygen[1222]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:20:34.308582 systemd[1]: Finished sshd-keygen.service. Dec 13 14:20:34.318838 systemd[1]: Starting issuegen.service... Dec 13 14:20:34.333112 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:20:34.333399 systemd[1]: Finished issuegen.service. Dec 13 14:20:34.344079 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:20:34.361058 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:20:34.372986 systemd[1]: Started getty@tty1.service. Dec 13 14:20:34.382669 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:20:34.391458 systemd[1]: Reached target getty.target. Dec 13 14:20:34.476063 locksmithd[1264]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:20:35.164729 kubelet[1287]: E1213 14:20:35.164674 1287 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:20:35.167639 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:20:35.167910 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:20:35.168346 systemd[1]: kubelet.service: Consumed 1.459s CPU time. Dec 13 14:20:37.358979 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:20:39.565966 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:20:39.591088 systemd-nspawn[1313]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:20:39.591088 systemd-nspawn[1313]: Press ^] three times within 1s to kill container. Dec 13 14:20:39.607937 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:20:39.692127 systemd[1]: Started oem-gce.service. Dec 13 14:20:39.692571 systemd[1]: Reached target multi-user.target. Dec 13 14:20:39.694939 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:20:39.706188 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:20:39.706444 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:20:39.706712 systemd[1]: Startup finished in 1.052s (kernel) + 8.512s (initrd) + 15.908s (userspace) = 25.473s. Dec 13 14:20:39.826061 systemd-nspawn[1313]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:20:39.826326 systemd-nspawn[1313]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:20:39.826326 systemd-nspawn[1313]: + /usr/bin/google_instance_setup Dec 13 14:20:40.514523 instance-setup[1319]: INFO Running google_set_multiqueue. Dec 13 14:20:40.531492 instance-setup[1319]: INFO Set channels for eth0 to 2. Dec 13 14:20:40.535304 instance-setup[1319]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:20:40.536726 instance-setup[1319]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:20:40.537297 instance-setup[1319]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:20:40.538563 instance-setup[1319]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:20:40.538979 instance-setup[1319]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:20:40.540378 instance-setup[1319]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:20:40.540789 instance-setup[1319]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:20:40.542154 instance-setup[1319]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:20:40.568974 instance-setup[1319]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:20:40.569171 instance-setup[1319]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:20:40.610662 systemd-nspawn[1313]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:20:40.735757 systemd[1]: Created slice system-sshd.slice. Dec 13 14:20:40.739542 systemd[1]: Started sshd@0-10.128.0.72:22-139.178.68.195:51412.service. Dec 13 14:20:40.988695 startup-script[1350]: INFO Starting startup scripts. Dec 13 14:20:41.003047 startup-script[1350]: INFO No startup scripts found in metadata. Dec 13 14:20:41.003209 startup-script[1350]: INFO Finished running startup scripts. Dec 13 14:20:41.040201 systemd-nspawn[1313]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:20:41.040201 systemd-nspawn[1313]: + daemon_pids=() Dec 13 14:20:41.040718 systemd-nspawn[1313]: + for d in accounts clock_skew network Dec 13 14:20:41.040927 systemd-nspawn[1313]: + daemon_pids+=($!) Dec 13 14:20:41.041456 systemd-nspawn[1313]: + /usr/bin/google_accounts_daemon Dec 13 14:20:41.041456 systemd-nspawn[1313]: + for d in accounts clock_skew network Dec 13 14:20:41.041704 systemd-nspawn[1313]: + daemon_pids+=($!) Dec 13 14:20:41.041962 systemd-nspawn[1313]: + for d in accounts clock_skew network Dec 13 14:20:41.042413 systemd-nspawn[1313]: + daemon_pids+=($!) Dec 13 14:20:41.042676 systemd-nspawn[1313]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:20:41.042912 systemd-nspawn[1313]: + /usr/bin/systemd-notify --ready Dec 13 14:20:41.043871 systemd-nspawn[1313]: + /usr/bin/google_network_daemon Dec 13 14:20:41.044480 systemd-nspawn[1313]: + /usr/bin/google_clock_skew_daemon Dec 13 14:20:41.072333 sshd[1352]: Accepted publickey for core from 139.178.68.195 port 51412 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:41.075377 sshd[1352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:41.095934 systemd[1]: Created slice user-500.slice. Dec 13 14:20:41.098101 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:20:41.106238 systemd-logind[1240]: New session 1 of user core. Dec 13 14:20:41.118346 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:20:41.122985 systemd[1]: Starting user@500.service... Dec 13 14:20:41.131118 systemd-nspawn[1313]: + wait -n 36 37 38 Dec 13 14:20:41.165988 (systemd)[1361]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:41.376093 systemd[1361]: Queued start job for default target default.target. Dec 13 14:20:41.376963 systemd[1361]: Reached target paths.target. Dec 13 14:20:41.377004 systemd[1361]: Reached target sockets.target. Dec 13 14:20:41.377027 systemd[1361]: Reached target timers.target. Dec 13 14:20:41.377048 systemd[1361]: Reached target basic.target. Dec 13 14:20:41.377122 systemd[1361]: Reached target default.target. Dec 13 14:20:41.377175 systemd[1361]: Startup finished in 191ms. Dec 13 14:20:41.377313 systemd[1]: Started user@500.service. Dec 13 14:20:41.379066 systemd[1]: Started session-1.scope. Dec 13 14:20:41.608575 systemd[1]: Started sshd@1-10.128.0.72:22-139.178.68.195:51422.service. Dec 13 14:20:41.925103 sshd[1370]: Accepted publickey for core from 139.178.68.195 port 51422 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:41.926142 sshd[1370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:41.934499 systemd[1]: Started session-2.scope. Dec 13 14:20:41.935879 systemd-logind[1240]: New session 2 of user core. Dec 13 14:20:41.971659 google-clock-skew[1357]: INFO Starting Google Clock Skew daemon. Dec 13 14:20:41.984456 google-clock-skew[1357]: INFO Clock drift token has changed: 0. Dec 13 14:20:41.991385 systemd-nspawn[1313]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:20:41.991385 systemd-nspawn[1313]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:20:41.992364 google-clock-skew[1357]: WARNING Failed to sync system time with hardware clock. Dec 13 14:20:42.027204 google-networking[1358]: INFO Starting Google Networking daemon. Dec 13 14:20:42.139228 sshd[1370]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:42.143598 systemd[1]: sshd@1-10.128.0.72:22-139.178.68.195:51422.service: Deactivated successfully. Dec 13 14:20:42.144751 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:20:42.145668 systemd-logind[1240]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:20:42.146981 systemd-logind[1240]: Removed session 2. Dec 13 14:20:42.156437 groupadd[1378]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:20:42.160444 groupadd[1378]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:20:42.164551 groupadd[1378]: new group: name=google-sudoers, GID=1000 Dec 13 14:20:42.177467 google-accounts[1356]: INFO Starting Google Accounts daemon. Dec 13 14:20:42.185975 systemd[1]: Started sshd@2-10.128.0.72:22-139.178.68.195:51426.service. Dec 13 14:20:42.210242 google-accounts[1356]: WARNING OS Login not installed. Dec 13 14:20:42.213418 google-accounts[1356]: INFO Creating a new user account for 0. Dec 13 14:20:42.219395 systemd-nspawn[1313]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:20:42.220071 google-accounts[1356]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:20:42.481295 sshd[1391]: Accepted publickey for core from 139.178.68.195 port 51426 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:42.483564 sshd[1391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:42.489901 systemd-logind[1240]: New session 3 of user core. Dec 13 14:20:42.490664 systemd[1]: Started session-3.scope. Dec 13 14:20:42.689696 sshd[1391]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:42.693792 systemd[1]: sshd@2-10.128.0.72:22-139.178.68.195:51426.service: Deactivated successfully. Dec 13 14:20:42.694854 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:20:42.695690 systemd-logind[1240]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:20:42.696947 systemd-logind[1240]: Removed session 3. Dec 13 14:20:42.736240 systemd[1]: Started sshd@3-10.128.0.72:22-139.178.68.195:51432.service. Dec 13 14:20:43.026233 sshd[1400]: Accepted publickey for core from 139.178.68.195 port 51432 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:43.027948 sshd[1400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:43.034298 systemd-logind[1240]: New session 4 of user core. Dec 13 14:20:43.035094 systemd[1]: Started session-4.scope. Dec 13 14:20:43.241190 sshd[1400]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:43.245220 systemd[1]: sshd@3-10.128.0.72:22-139.178.68.195:51432.service: Deactivated successfully. Dec 13 14:20:43.246274 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:20:43.247199 systemd-logind[1240]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:20:43.248453 systemd-logind[1240]: Removed session 4. Dec 13 14:20:43.287506 systemd[1]: Started sshd@4-10.128.0.72:22-139.178.68.195:51444.service. Dec 13 14:20:43.577985 sshd[1406]: Accepted publickey for core from 139.178.68.195 port 51444 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:43.579740 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:43.586565 systemd[1]: Started session-5.scope. Dec 13 14:20:43.587242 systemd-logind[1240]: New session 5 of user core. Dec 13 14:20:43.776062 sudo[1409]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:20:43.776498 sudo[1409]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:20:43.786166 dbus-daemon[1197]: \xd0-\xed|\xf3U: received setenforce notice (enforcing=621064512) Dec 13 14:20:43.788405 sudo[1409]: pam_unix(sudo:session): session closed for user root Dec 13 14:20:43.833063 sshd[1406]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:43.837806 systemd[1]: sshd@4-10.128.0.72:22-139.178.68.195:51444.service: Deactivated successfully. Dec 13 14:20:43.838989 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:20:43.839869 systemd-logind[1240]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:20:43.841360 systemd-logind[1240]: Removed session 5. Dec 13 14:20:43.880934 systemd[1]: Started sshd@5-10.128.0.72:22-139.178.68.195:51446.service. Dec 13 14:20:44.177166 sshd[1413]: Accepted publickey for core from 139.178.68.195 port 51446 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:44.179207 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:44.185408 systemd-logind[1240]: New session 6 of user core. Dec 13 14:20:44.186180 systemd[1]: Started session-6.scope. Dec 13 14:20:44.358071 sudo[1417]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:20:44.358508 sudo[1417]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:20:44.363051 sudo[1417]: pam_unix(sudo:session): session closed for user root Dec 13 14:20:44.375981 sudo[1416]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:20:44.376401 sudo[1416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:20:44.389779 systemd[1]: Stopping audit-rules.service... Dec 13 14:20:44.390000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:20:44.393137 auditctl[1420]: No rules Dec 13 14:20:44.397334 kernel: kauditd_printk_skb: 212 callbacks suppressed Dec 13 14:20:44.397470 kernel: audit: type=1305 audit(1734099644.390:194): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:20:44.397990 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:20:44.398263 systemd[1]: Stopped audit-rules.service. Dec 13 14:20:44.405087 systemd[1]: Starting audit-rules.service... Dec 13 14:20:44.390000 audit[1420]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeaaa88cf0 a2=420 a3=0 items=0 ppid=1 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:44.440688 systemd[1]: Finished audit-rules.service. Dec 13 14:20:44.444689 augenrules[1437]: No rules Dec 13 14:20:44.444916 kernel: audit: type=1300 audit(1734099644.390:194): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeaaa88cf0 a2=420 a3=0 items=0 ppid=1 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:44.390000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:20:44.447849 sudo[1416]: pam_unix(sudo:session): session closed for user root Dec 13 14:20:44.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.477215 kernel: audit: type=1327 audit(1734099644.390:194): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:20:44.477416 kernel: audit: type=1131 audit(1734099644.397:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.477463 kernel: audit: type=1130 audit(1734099644.440:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.447000 audit[1416]: USER_END pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.503036 sshd[1413]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:44.508695 systemd-logind[1240]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:20:44.511473 systemd[1]: sshd@5-10.128.0.72:22-139.178.68.195:51446.service: Deactivated successfully. Dec 13 14:20:44.512604 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:20:44.514961 systemd-logind[1240]: Removed session 6. Dec 13 14:20:44.524450 kernel: audit: type=1106 audit(1734099644.447:197): pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.524656 kernel: audit: type=1104 audit(1734099644.447:198): pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.447000 audit[1416]: CRED_DISP pid=1416 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.504000 audit[1413]: USER_END pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.559069 systemd[1]: Started sshd@6-10.128.0.72:22-139.178.68.195:51456.service. Dec 13 14:20:44.580401 kernel: audit: type=1106 audit(1734099644.504:199): pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.504000 audit[1413]: CRED_DISP pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.580935 kernel: audit: type=1104 audit(1734099644.504:200): pid=1413 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.72:22-139.178.68.195:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.606135 kernel: audit: type=1131 audit(1734099644.510:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.72:22-139.178.68.195:51446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.72:22-139.178.68.195:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:44.873000 audit[1443]: USER_ACCT pid=1443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.875318 sshd[1443]: Accepted publickey for core from 139.178.68.195 port 51456 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:20:44.874000 audit[1443]: CRED_ACQ pid=1443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.875000 audit[1443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe34354290 a2=3 a3=0 items=0 ppid=1 pid=1443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:44.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:20:44.876459 sshd[1443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:20:44.883568 systemd[1]: Started session-7.scope. Dec 13 14:20:44.884223 systemd-logind[1240]: New session 7 of user core. Dec 13 14:20:44.891000 audit[1443]: USER_START pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:44.893000 audit[1445]: CRED_ACQ pid=1445 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:20:45.053000 audit[1446]: USER_ACCT pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.055052 sudo[1446]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:20:45.054000 audit[1446]: CRED_REFR pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.055507 sudo[1446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:20:45.057000 audit[1446]: USER_START pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.090711 systemd[1]: Starting docker.service... Dec 13 14:20:45.141802 env[1456]: time="2024-12-13T14:20:45.140788908Z" level=info msg="Starting up" Dec 13 14:20:45.143505 env[1456]: time="2024-12-13T14:20:45.143344428Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:20:45.143505 env[1456]: time="2024-12-13T14:20:45.143375595Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:20:45.143505 env[1456]: time="2024-12-13T14:20:45.143410146Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:20:45.143505 env[1456]: time="2024-12-13T14:20:45.143426070Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:20:45.145616 env[1456]: time="2024-12-13T14:20:45.145589269Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:20:45.145780 env[1456]: time="2024-12-13T14:20:45.145759511Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:20:45.145990 env[1456]: time="2024-12-13T14:20:45.145956167Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:20:45.145990 env[1456]: time="2024-12-13T14:20:45.145988062Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:20:45.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.173913 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:20:45.174161 systemd[1]: Stopped kubelet.service. Dec 13 14:20:45.174241 systemd[1]: kubelet.service: Consumed 1.459s CPU time. Dec 13 14:20:45.176178 systemd[1]: Starting kubelet.service... Dec 13 14:20:45.186509 env[1456]: time="2024-12-13T14:20:45.186456466Z" level=info msg="Loading containers: start." Dec 13 14:20:45.291000 audit[1488]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.291000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd70001200 a2=0 a3=7ffd700011ec items=0 ppid=1456 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:20:45.295000 audit[1490]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.295000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffee4cc3a60 a2=0 a3=7ffee4cc3a4c items=0 ppid=1456 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:20:45.299000 audit[1492]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.299000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffef6cca3d0 a2=0 a3=7ffef6cca3bc items=0 ppid=1456 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:20:45.302000 audit[1494]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.302000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc398468d0 a2=0 a3=7ffc398468bc items=0 ppid=1456 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:20:45.310000 audit[1496]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.310000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd64713f20 a2=0 a3=7ffd64713f0c items=0 ppid=1456 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:20:45.343000 audit[1501]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.343000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9cd31310 a2=0 a3=7fff9cd312fc items=0 ppid=1456 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:20:45.384000 audit[1504]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.384000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde99f50f0 a2=0 a3=7ffde99f50dc items=0 ppid=1456 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.384000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:20:45.390000 audit[1506]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.390000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc098dfba0 a2=0 a3=7ffc098dfb8c items=0 ppid=1456 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.390000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:20:45.395000 audit[1508]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.395000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffccdf92820 a2=0 a3=7ffccdf9280c items=0 ppid=1456 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:20:45.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.405113 systemd[1]: Started kubelet.service. Dec 13 14:20:45.455000 audit[1521]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.455000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc11728070 a2=0 a3=7ffc1172805c items=0 ppid=1456 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:20:45.460000 audit[1522]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.460000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd1e07930 a2=0 a3=7ffcd1e0791c items=0 ppid=1456 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.460000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:20:45.477608 kubelet[1511]: E1213 14:20:45.477559 1511 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:20:45.483915 kernel: Initializing XFRM netlink socket Dec 13 14:20:45.487622 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:20:45.487855 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:20:45.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:45.530677 env[1456]: time="2024-12-13T14:20:45.530613728Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:20:45.562000 audit[1530]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.562000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd13139400 a2=0 a3=7ffd131393ec items=0 ppid=1456 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:20:45.574000 audit[1533]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.574000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd88547990 a2=0 a3=7ffd8854797c items=0 ppid=1456 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:20:45.579000 audit[1536]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.579000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd56198670 a2=0 a3=7ffd5619865c items=0 ppid=1456 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:20:45.583000 audit[1538]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.583000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc6896c4c0 a2=0 a3=7ffc6896c4ac items=0 ppid=1456 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:20:45.586000 audit[1540]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.586000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff4c56cb80 a2=0 a3=7fff4c56cb6c items=0 ppid=1456 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.586000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:20:45.590000 audit[1542]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.590000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd58338450 a2=0 a3=7ffd5833843c items=0 ppid=1456 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.590000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:20:45.593000 audit[1544]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.593000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcac212150 a2=0 a3=7ffcac21213c items=0 ppid=1456 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:20:45.606000 audit[1547]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.606000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdadc08370 a2=0 a3=7ffdadc0835c items=0 ppid=1456 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:20:45.609000 audit[1549]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.609000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd6cbf92d0 a2=0 a3=7ffd6cbf92bc items=0 ppid=1456 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:20:45.613000 audit[1551]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.613000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffba16e3d0 a2=0 a3=7fffba16e3bc items=0 ppid=1456 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:20:45.616000 audit[1553]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.616000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcb320dc40 a2=0 a3=7ffcb320dc2c items=0 ppid=1456 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:20:45.617701 systemd-networkd[1032]: docker0: Link UP Dec 13 14:20:45.630000 audit[1557]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.630000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe88ff7c60 a2=0 a3=7ffe88ff7c4c items=0 ppid=1456 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:20:45.635000 audit[1558]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:45.635000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe70599110 a2=0 a3=7ffe705990fc items=0 ppid=1456 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:20:45.637020 env[1456]: time="2024-12-13T14:20:45.636969917Z" level=info msg="Loading containers: done." Dec 13 14:20:45.662959 env[1456]: time="2024-12-13T14:20:45.661508636Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:20:45.662959 env[1456]: time="2024-12-13T14:20:45.661805687Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:20:45.662959 env[1456]: time="2024-12-13T14:20:45.661976340Z" level=info msg="Daemon has completed initialization" Dec 13 14:20:45.684930 systemd[1]: Started docker.service. Dec 13 14:20:45.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:45.698555 env[1456]: time="2024-12-13T14:20:45.698479471Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:20:46.895900 env[1228]: time="2024-12-13T14:20:46.895814345Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:20:47.439741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2079930318.mount: Deactivated successfully. Dec 13 14:20:49.484465 env[1228]: time="2024-12-13T14:20:49.484386214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:49.487521 env[1228]: time="2024-12-13T14:20:49.487469057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:49.491763 env[1228]: time="2024-12-13T14:20:49.491713631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:49.494409 env[1228]: time="2024-12-13T14:20:49.494360926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:49.496609 env[1228]: time="2024-12-13T14:20:49.496546773Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 14:20:49.513567 env[1228]: time="2024-12-13T14:20:49.513496158Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:20:51.670236 env[1228]: time="2024-12-13T14:20:51.670158944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:51.673282 env[1228]: time="2024-12-13T14:20:51.673227480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:51.675793 env[1228]: time="2024-12-13T14:20:51.675746538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:51.678183 env[1228]: time="2024-12-13T14:20:51.678137867Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:51.679235 env[1228]: time="2024-12-13T14:20:51.679181811Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 14:20:51.694051 env[1228]: time="2024-12-13T14:20:51.693997793Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:20:53.042672 env[1228]: time="2024-12-13T14:20:53.042590139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.045682 env[1228]: time="2024-12-13T14:20:53.045614719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.048495 env[1228]: time="2024-12-13T14:20:53.048442519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.051090 env[1228]: time="2024-12-13T14:20:53.051043659Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.052134 env[1228]: time="2024-12-13T14:20:53.052089716Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 14:20:53.066791 env[1228]: time="2024-12-13T14:20:53.066738099Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:20:54.402627 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3677726741.mount: Deactivated successfully. Dec 13 14:20:55.104422 env[1228]: time="2024-12-13T14:20:55.104341145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:55.107498 env[1228]: time="2024-12-13T14:20:55.107448715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:55.109793 env[1228]: time="2024-12-13T14:20:55.109731366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:55.112023 env[1228]: time="2024-12-13T14:20:55.111982585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:55.112794 env[1228]: time="2024-12-13T14:20:55.112734460Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:20:55.127377 env[1228]: time="2024-12-13T14:20:55.127307845Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:20:55.608187 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:20:55.608382 kernel: audit: type=1130 audit(1734099655.580:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:55.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:55.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:55.581151 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:20:55.581421 systemd[1]: Stopped kubelet.service. Dec 13 14:20:55.630265 kernel: audit: type=1131 audit(1734099655.599:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:55.631253 systemd[1]: Starting kubelet.service... Dec 13 14:20:55.635820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount636217219.mount: Deactivated successfully. Dec 13 14:20:55.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:55.908701 systemd[1]: Started kubelet.service. Dec 13 14:20:55.931981 kernel: audit: type=1130 audit(1734099655.908:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:56.014915 kubelet[1624]: E1213 14:20:56.014821 1624 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:20:56.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:56.019128 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:20:56.019362 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:20:56.041934 kernel: audit: type=1131 audit(1734099656.018:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:57.028163 env[1228]: time="2024-12-13T14:20:57.028083861Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.034812 env[1228]: time="2024-12-13T14:20:57.034741003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.039804 env[1228]: time="2024-12-13T14:20:57.039742603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.043023 env[1228]: time="2024-12-13T14:20:57.042967916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.043915 env[1228]: time="2024-12-13T14:20:57.043831937Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:20:57.058542 env[1228]: time="2024-12-13T14:20:57.058489029Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:20:57.618321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1402427073.mount: Deactivated successfully. Dec 13 14:20:57.628473 env[1228]: time="2024-12-13T14:20:57.628397932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.631314 env[1228]: time="2024-12-13T14:20:57.631256482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.633865 env[1228]: time="2024-12-13T14:20:57.633804961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.636242 env[1228]: time="2024-12-13T14:20:57.636194005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:57.637063 env[1228]: time="2024-12-13T14:20:57.637014272Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:20:57.651861 env[1228]: time="2024-12-13T14:20:57.651806904Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:20:58.120547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2552156517.mount: Deactivated successfully. Dec 13 14:21:00.812379 env[1228]: time="2024-12-13T14:21:00.812302129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.815587 env[1228]: time="2024-12-13T14:21:00.815535112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.818395 env[1228]: time="2024-12-13T14:21:00.818348051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.820931 env[1228]: time="2024-12-13T14:21:00.820870233Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.822044 env[1228]: time="2024-12-13T14:21:00.821987717Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 14:21:02.383041 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:21:02.405949 kernel: audit: type=1131 audit(1734099662.382:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:02.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:02.428000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:21:02.443641 kernel: audit: type=1334 audit(1734099662.428:245): prog-id=44 op=UNLOAD Dec 13 14:21:02.443767 kernel: audit: type=1334 audit(1734099662.428:246): prog-id=43 op=UNLOAD Dec 13 14:21:02.428000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:21:02.428000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:21:02.451934 kernel: audit: type=1334 audit(1734099662.428:247): prog-id=42 op=UNLOAD Dec 13 14:21:03.887094 systemd[1]: Stopped kubelet.service. Dec 13 14:21:03.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:03.909918 kernel: audit: type=1130 audit(1734099663.886:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:03.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:03.913408 systemd[1]: Starting kubelet.service... Dec 13 14:21:03.932925 kernel: audit: type=1131 audit(1734099663.887:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:03.947506 systemd[1]: Reloading. Dec 13 14:21:04.061324 /usr/lib/systemd/system-generators/torcx-generator[1727]: time="2024-12-13T14:21:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:21:04.061413 /usr/lib/systemd/system-generators/torcx-generator[1727]: time="2024-12-13T14:21:04Z" level=info msg="torcx already run" Dec 13 14:21:04.178125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:21:04.178154 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:21:04.212176 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.331928 kernel: audit: type=1400 audit(1734099664.309:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.374403 kernel: audit: type=1400 audit(1734099664.309:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.375336 kernel: audit: type=1400 audit(1734099664.309:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.375407 kernel: audit: type=1400 audit(1734099664.309:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit: BPF prog-id=46 op=LOAD Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.330000 audit: BPF prog-id=47 op=LOAD Dec 13 14:21:04.330000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:21:04.330000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit: BPF prog-id=48 op=LOAD Dec 13 14:21:04.426000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit: BPF prog-id=49 op=LOAD Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.426000 audit: BPF prog-id=50 op=LOAD Dec 13 14:21:04.426000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:21:04.426000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.428000 audit: BPF prog-id=51 op=LOAD Dec 13 14:21:04.428000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.430000 audit: BPF prog-id=52 op=LOAD Dec 13 14:21:04.430000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.431000 audit: BPF prog-id=53 op=LOAD Dec 13 14:21:04.431000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.432000 audit: BPF prog-id=54 op=LOAD Dec 13 14:21:04.432000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit: BPF prog-id=55 op=LOAD Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.433000 audit: BPF prog-id=56 op=LOAD Dec 13 14:21:04.433000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:21:04.433000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.435000 audit: BPF prog-id=57 op=LOAD Dec 13 14:21:04.435000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit: BPF prog-id=58 op=LOAD Dec 13 14:21:04.438000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit: BPF prog-id=59 op=LOAD Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:04.439000 audit: BPF prog-id=60 op=LOAD Dec 13 14:21:04.439000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:21:04.439000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:21:04.505000 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:21:04.505155 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:21:04.505619 systemd[1]: Stopped kubelet.service. Dec 13 14:21:04.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:21:04.508503 systemd[1]: Starting kubelet.service... Dec 13 14:21:04.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:04.799981 systemd[1]: Started kubelet.service. Dec 13 14:21:04.869750 kubelet[1775]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:04.870288 kubelet[1775]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:21:04.870288 kubelet[1775]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:04.870288 kubelet[1775]: I1213 14:21:04.870048 1775 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:21:05.195561 kubelet[1775]: I1213 14:21:05.195503 1775 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:21:05.195561 kubelet[1775]: I1213 14:21:05.195535 1775 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:21:05.195914 kubelet[1775]: I1213 14:21:05.195857 1775 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:21:05.231609 kubelet[1775]: I1213 14:21:05.231570 1775 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:21:05.233314 kubelet[1775]: E1213 14:21:05.233263 1775 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.72:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.252784 kubelet[1775]: I1213 14:21:05.252732 1775 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:21:05.256674 kubelet[1775]: I1213 14:21:05.256584 1775 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:21:05.256957 kubelet[1775]: I1213 14:21:05.256653 1775 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:21:05.257978 kubelet[1775]: I1213 14:21:05.257940 1775 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:21:05.257978 kubelet[1775]: I1213 14:21:05.257976 1775 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:21:05.258223 kubelet[1775]: I1213 14:21:05.258191 1775 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:05.259673 kubelet[1775]: I1213 14:21:05.259641 1775 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:21:05.259783 kubelet[1775]: I1213 14:21:05.259679 1775 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:21:05.259783 kubelet[1775]: I1213 14:21:05.259713 1775 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:21:05.259783 kubelet[1775]: I1213 14:21:05.259740 1775 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:21:05.271019 kubelet[1775]: W1213 14:21:05.270939 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.72:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.271168 kubelet[1775]: E1213 14:21:05.271025 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.72:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.272091 kubelet[1775]: W1213 14:21:05.271401 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.72:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.272091 kubelet[1775]: E1213 14:21:05.271467 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.72:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.272881 kubelet[1775]: I1213 14:21:05.272413 1775 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:21:05.278058 kubelet[1775]: I1213 14:21:05.278007 1775 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:21:05.278193 kubelet[1775]: W1213 14:21:05.278135 1775 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:21:05.279595 kubelet[1775]: I1213 14:21:05.278840 1775 server.go:1264] "Started kubelet" Dec 13 14:21:05.285224 kubelet[1775]: I1213 14:21:05.285187 1775 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:21:05.286650 kubelet[1775]: I1213 14:21:05.286600 1775 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:21:05.293000 audit[1775]: AVC avc: denied { mac_admin } for pid=1775 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:05.293000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:05.293000 audit[1775]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009447b0 a1=c0007e8c90 a2=c000944780 a3=25 items=0 ppid=1 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.293000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:05.293000 audit[1775]: AVC avc: denied { mac_admin } for pid=1775 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:05.293000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:05.293000 audit[1775]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00087e540 a1=c0007e8ca8 a2=c000944840 a3=25 items=0 ppid=1 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.293000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:05.295426 kubelet[1775]: I1213 14:21:05.294621 1775 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:21:05.295426 kubelet[1775]: I1213 14:21:05.294697 1775 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:21:05.295426 kubelet[1775]: I1213 14:21:05.294783 1775 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:21:05.295686 kubelet[1775]: I1213 14:21:05.295617 1775 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:21:05.296050 kubelet[1775]: I1213 14:21:05.296026 1775 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:21:05.297826 kubelet[1775]: E1213 14:21:05.297668 1775 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.72:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.72:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal.1810c2753a112aac default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,UID:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,LastTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,}" Dec 13 14:21:05.299000 audit[1785]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.299000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc656a68f0 a2=0 a3=7ffc656a68dc items=0 ppid=1775 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:21:05.302000 audit[1786]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.302000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaea79300 a2=0 a3=7ffcaea792ec items=0 ppid=1775 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:21:05.306422 kubelet[1775]: E1213 14:21:05.306391 1775 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:21:05.306581 kubelet[1775]: I1213 14:21:05.306558 1775 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:21:05.307229 kubelet[1775]: I1213 14:21:05.306531 1775 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:21:05.307729 kubelet[1775]: I1213 14:21:05.307701 1775 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:21:05.307920 kubelet[1775]: W1213 14:21:05.307841 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.72:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.308004 kubelet[1775]: E1213 14:21:05.307939 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.72:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.308082 kubelet[1775]: E1213 14:21:05.308039 1775 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.72:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.72:6443: connect: connection refused" interval="200ms" Dec 13 14:21:05.308000 audit[1788]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.308000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc330cc320 a2=0 a3=7ffc330cc30c items=0 ppid=1775 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:05.310285 kubelet[1775]: I1213 14:21:05.310259 1775 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:21:05.310285 kubelet[1775]: I1213 14:21:05.310287 1775 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:21:05.310426 kubelet[1775]: I1213 14:21:05.310363 1775 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:21:05.313000 audit[1790]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.313000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfdf48230 a2=0 a3=7ffcfdf4821c items=0 ppid=1775 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:05.325000 audit[1793]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.325000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcc5754150 a2=0 a3=7ffcc575413c items=0 ppid=1775 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:21:05.326973 kubelet[1775]: I1213 14:21:05.326931 1775 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:21:05.327000 audit[1795]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:05.327000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe987f98b0 a2=0 a3=7ffe987f989c items=0 ppid=1775 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:21:05.329327 kubelet[1775]: I1213 14:21:05.329274 1775 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:21:05.329327 kubelet[1775]: I1213 14:21:05.329316 1775 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:21:05.329470 kubelet[1775]: I1213 14:21:05.329347 1775 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:21:05.329470 kubelet[1775]: E1213 14:21:05.329411 1775 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:21:05.329000 audit[1796]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.329000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0f9b2d10 a2=0 a3=7ffe0f9b2cfc items=0 ppid=1775 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:21:05.331000 audit[1797]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.331000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1e9b8e60 a2=0 a3=7ffd1e9b8e4c items=0 ppid=1775 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:21:05.333000 audit[1798]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:05.333000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0e772ef0 a2=0 a3=7ffc0e772edc items=0 ppid=1775 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:21:05.334000 audit[1799]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:05.334000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdc12ed60 a2=0 a3=7ffcdc12ed4c items=0 ppid=1775 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:21:05.336000 audit[1800]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:05.336000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdec996880 a2=0 a3=7ffdec99686c items=0 ppid=1775 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:21:05.340566 kubelet[1775]: W1213 14:21:05.340487 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.72:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.340815 kubelet[1775]: E1213 14:21:05.340782 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.72:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:05.343000 audit[1801]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:05.343000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5c1a06b0 a2=0 a3=7ffc5c1a069c items=0 ppid=1775 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:21:05.354017 kubelet[1775]: I1213 14:21:05.353958 1775 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:21:05.354250 kubelet[1775]: I1213 14:21:05.354234 1775 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:21:05.354362 kubelet[1775]: I1213 14:21:05.354351 1775 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:05.358271 kubelet[1775]: I1213 14:21:05.358240 1775 policy_none.go:49] "None policy: Start" Dec 13 14:21:05.359358 kubelet[1775]: I1213 14:21:05.359330 1775 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:21:05.359519 kubelet[1775]: I1213 14:21:05.359507 1775 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:21:05.367596 systemd[1]: Created slice kubepods.slice. Dec 13 14:21:05.374844 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:21:05.379580 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:21:05.387055 kubelet[1775]: I1213 14:21:05.387019 1775 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:21:05.386000 audit[1775]: AVC avc: denied { mac_admin } for pid=1775 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:05.386000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:05.386000 audit[1775]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af5380 a1=c00069a720 a2=c000af5350 a3=25 items=0 ppid=1 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:05.386000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:05.387531 kubelet[1775]: I1213 14:21:05.387136 1775 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:21:05.387531 kubelet[1775]: I1213 14:21:05.387319 1775 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:21:05.387531 kubelet[1775]: I1213 14:21:05.387477 1775 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:21:05.392701 kubelet[1775]: E1213 14:21:05.392649 1775 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" not found" Dec 13 14:21:05.413548 kubelet[1775]: I1213 14:21:05.413502 1775 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.413957 kubelet[1775]: E1213 14:21:05.413917 1775 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.72:6443/api/v1/nodes\": dial tcp 10.128.0.72:6443: connect: connection refused" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.430349 kubelet[1775]: I1213 14:21:05.430269 1775 topology_manager.go:215] "Topology Admit Handler" podUID="de95dc37091579a9bf1537dacc59013b" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.435065 kubelet[1775]: I1213 14:21:05.435007 1775 topology_manager.go:215] "Topology Admit Handler" podUID="5284441df75da42ded151c017b903893" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.440524 kubelet[1775]: I1213 14:21:05.440484 1775 topology_manager.go:215] "Topology Admit Handler" podUID="5e97f6f790c77a53e9b6bffee1a2c50d" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.446652 systemd[1]: Created slice kubepods-burstable-podde95dc37091579a9bf1537dacc59013b.slice. Dec 13 14:21:05.471481 systemd[1]: Created slice kubepods-burstable-pod5284441df75da42ded151c017b903893.slice. Dec 13 14:21:05.483797 systemd[1]: Created slice kubepods-burstable-pod5e97f6f790c77a53e9b6bffee1a2c50d.slice. Dec 13 14:21:05.508803 kubelet[1775]: I1213 14:21:05.508741 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509043 kubelet[1775]: I1213 14:21:05.508820 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509043 kubelet[1775]: I1213 14:21:05.508858 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509043 kubelet[1775]: I1213 14:21:05.509019 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509241 kubelet[1775]: I1213 14:21:05.509069 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509241 kubelet[1775]: I1213 14:21:05.509098 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509241 kubelet[1775]: I1213 14:21:05.509153 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509241 kubelet[1775]: I1213 14:21:05.509185 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509455 kubelet[1775]: I1213 14:21:05.509244 1775 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5e97f6f790c77a53e9b6bffee1a2c50d-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5e97f6f790c77a53e9b6bffee1a2c50d\") " pod="kube-system/kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.509821 kubelet[1775]: E1213 14:21:05.509774 1775 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.72:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.72:6443: connect: connection refused" interval="400ms" Dec 13 14:21:05.619797 kubelet[1775]: I1213 14:21:05.619757 1775 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.620208 kubelet[1775]: E1213 14:21:05.620157 1775 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.72:6443/api/v1/nodes\": dial tcp 10.128.0.72:6443: connect: connection refused" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:05.759184 env[1228]: time="2024-12-13T14:21:05.758592996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:de95dc37091579a9bf1537dacc59013b,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:05.781790 env[1228]: time="2024-12-13T14:21:05.781729850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:5284441df75da42ded151c017b903893,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:05.787508 env[1228]: time="2024-12-13T14:21:05.787441398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:5e97f6f790c77a53e9b6bffee1a2c50d,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:05.910467 kubelet[1775]: E1213 14:21:05.910395 1775 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.72:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.72:6443: connect: connection refused" interval="800ms" Dec 13 14:21:05.957093 kubelet[1775]: E1213 14:21:05.956920 1775 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.72:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.72:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal.1810c2753a112aac default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,UID:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,LastTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,}" Dec 13 14:21:06.027543 kubelet[1775]: I1213 14:21:06.027014 1775 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:06.027698 kubelet[1775]: E1213 14:21:06.027662 1775 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.72:6443/api/v1/nodes\": dial tcp 10.128.0.72:6443: connect: connection refused" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:06.136633 kubelet[1775]: W1213 14:21:06.136538 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.72:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.136633 kubelet[1775]: E1213 14:21:06.136633 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.72:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.240755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1180822283.mount: Deactivated successfully. Dec 13 14:21:06.251557 env[1228]: time="2024-12-13T14:21:06.251499037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.253098 env[1228]: time="2024-12-13T14:21:06.253014547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.256948 env[1228]: time="2024-12-13T14:21:06.256881832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.259873 env[1228]: time="2024-12-13T14:21:06.259795604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.261140 env[1228]: time="2024-12-13T14:21:06.261086697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.262519 env[1228]: time="2024-12-13T14:21:06.262467748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.264452 env[1228]: time="2024-12-13T14:21:06.264402189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.265358 env[1228]: time="2024-12-13T14:21:06.265291089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.266222 env[1228]: time="2024-12-13T14:21:06.266186367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.269819 env[1228]: time="2024-12-13T14:21:06.269769177Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.272366 env[1228]: time="2024-12-13T14:21:06.272323896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.273689 env[1228]: time="2024-12-13T14:21:06.273637046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:06.328167 env[1228]: time="2024-12-13T14:21:06.324660172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:06.328167 env[1228]: time="2024-12-13T14:21:06.324719914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:06.328167 env[1228]: time="2024-12-13T14:21:06.324938998Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:06.328167 env[1228]: time="2024-12-13T14:21:06.327356818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f9a24ad71016b65cf94f0e486564afa964407629d1ae786a941ce2a444e6122 pid=1817 runtime=io.containerd.runc.v2 Dec 13 14:21:06.336312 env[1228]: time="2024-12-13T14:21:06.336214751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:06.336501 env[1228]: time="2024-12-13T14:21:06.336326844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:06.336501 env[1228]: time="2024-12-13T14:21:06.336370092Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:06.336649 env[1228]: time="2024-12-13T14:21:06.336564090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8014193357f61933f10b896fd076cf8d9843c38441287d060603a9fed67e534 pid=1832 runtime=io.containerd.runc.v2 Dec 13 14:21:06.342788 env[1228]: time="2024-12-13T14:21:06.342558603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:06.342788 env[1228]: time="2024-12-13T14:21:06.342650216Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:06.342788 env[1228]: time="2024-12-13T14:21:06.342686529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:06.343305 env[1228]: time="2024-12-13T14:21:06.343233063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57c95fc362d53c640844ecbcfa58f4e04d59762c3c13a95cdc25a4522e9f2494 pid=1837 runtime=io.containerd.runc.v2 Dec 13 14:21:06.367439 systemd[1]: Started cri-containerd-a8014193357f61933f10b896fd076cf8d9843c38441287d060603a9fed67e534.scope. Dec 13 14:21:06.391436 systemd[1]: Started cri-containerd-8f9a24ad71016b65cf94f0e486564afa964407629d1ae786a941ce2a444e6122.scope. Dec 13 14:21:06.409461 systemd[1]: Started cri-containerd-57c95fc362d53c640844ecbcfa58f4e04d59762c3c13a95cdc25a4522e9f2494.scope. Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.415000 audit: BPF prog-id=61 op=LOAD Dec 13 14:21:06.419173 kubelet[1775]: W1213 14:21:06.418251 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.72:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.419173 kubelet[1775]: E1213 14:21:06.418332 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.72:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.417000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.417000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1832 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303134313933333537663631393333663130623839366664303736 Dec 13 14:21:06.418000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.418000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1832 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303134313933333537663631393333663130623839366664303736 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.419000 audit: BPF prog-id=62 op=LOAD Dec 13 14:21:06.419000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4960 items=0 ppid=1832 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303134313933333537663631393333663130623839366664303736 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.420000 audit: BPF prog-id=63 op=LOAD Dec 13 14:21:06.420000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e49a8 items=0 ppid=1832 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303134313933333537663631393333663130623839366664303736 Dec 13 14:21:06.421000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:21:06.421000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.421000 audit: BPF prog-id=64 op=LOAD Dec 13 14:21:06.421000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4db8 items=0 ppid=1832 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303134313933333537663631393333663130623839366664303736 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.448000 audit: BPF prog-id=65 op=LOAD Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1837 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633935666333363264353363363430383434656362636661353866 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1837 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633935666333363264353363363430383434656362636661353866 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit: BPF prog-id=66 op=LOAD Dec 13 14:21:06.449000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000281040 items=0 ppid=1837 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633935666333363264353363363430383434656362636661353866 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.449000 audit: BPF prog-id=67 op=LOAD Dec 13 14:21:06.449000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000281088 items=0 ppid=1837 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633935666333363264353363363430383434656362636661353866 Dec 13 14:21:06.449000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:21:06.449000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.450000 audit: BPF prog-id=68 op=LOAD Dec 13 14:21:06.450000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000281498 items=0 ppid=1837 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633935666333363264353363363430383434656362636661353866 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.455000 audit: BPF prog-id=69 op=LOAD Dec 13 14:21:06.456000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.456000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1817 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396132346164373130313662363563663934663065343836353634 Dec 13 14:21:06.456000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.456000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1817 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396132346164373130313662363563663934663065343836353634 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.457000 audit: BPF prog-id=70 op=LOAD Dec 13 14:21:06.457000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218600 items=0 ppid=1817 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396132346164373130313662363563663934663065343836353634 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.458000 audit: BPF prog-id=71 op=LOAD Dec 13 14:21:06.458000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218648 items=0 ppid=1817 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396132346164373130313662363563663934663065343836353634 Dec 13 14:21:06.459000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:21:06.459000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.459000 audit: BPF prog-id=72 op=LOAD Dec 13 14:21:06.459000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218a58 items=0 ppid=1817 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396132346164373130313662363563663934663065343836353634 Dec 13 14:21:06.496926 env[1228]: time="2024-12-13T14:21:06.495421711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:de95dc37091579a9bf1537dacc59013b,Namespace:kube-system,Attempt:0,} returns sandbox id \"a8014193357f61933f10b896fd076cf8d9843c38441287d060603a9fed67e534\"" Dec 13 14:21:06.498808 kubelet[1775]: E1213 14:21:06.498744 1775 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-21291" Dec 13 14:21:06.503146 env[1228]: time="2024-12-13T14:21:06.503067148Z" level=info msg="CreateContainer within sandbox \"a8014193357f61933f10b896fd076cf8d9843c38441287d060603a9fed67e534\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:21:06.529254 env[1228]: time="2024-12-13T14:21:06.529176240Z" level=info msg="CreateContainer within sandbox \"a8014193357f61933f10b896fd076cf8d9843c38441287d060603a9fed67e534\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"aad9e67ce4f6a07b9fdbedf42b0af9a1101e7867de45e3c4b1e951a4d5109b1b\"" Dec 13 14:21:06.533271 env[1228]: time="2024-12-13T14:21:06.533214970Z" level=info msg="StartContainer for \"aad9e67ce4f6a07b9fdbedf42b0af9a1101e7867de45e3c4b1e951a4d5109b1b\"" Dec 13 14:21:06.568839 env[1228]: time="2024-12-13T14:21:06.568777763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:5e97f6f790c77a53e9b6bffee1a2c50d,Namespace:kube-system,Attempt:0,} returns sandbox id \"57c95fc362d53c640844ecbcfa58f4e04d59762c3c13a95cdc25a4522e9f2494\"" Dec 13 14:21:06.570303 env[1228]: time="2024-12-13T14:21:06.570248437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,Uid:5284441df75da42ded151c017b903893,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f9a24ad71016b65cf94f0e486564afa964407629d1ae786a941ce2a444e6122\"" Dec 13 14:21:06.572874 kubelet[1775]: E1213 14:21:06.572154 1775 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-21291" Dec 13 14:21:06.575088 kubelet[1775]: E1213 14:21:06.573751 1775 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flat" Dec 13 14:21:06.575623 env[1228]: time="2024-12-13T14:21:06.575558642Z" level=info msg="CreateContainer within sandbox \"57c95fc362d53c640844ecbcfa58f4e04d59762c3c13a95cdc25a4522e9f2494\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:21:06.581796 env[1228]: time="2024-12-13T14:21:06.581664116Z" level=info msg="CreateContainer within sandbox \"8f9a24ad71016b65cf94f0e486564afa964407629d1ae786a941ce2a444e6122\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:21:06.589027 systemd[1]: Started cri-containerd-aad9e67ce4f6a07b9fdbedf42b0af9a1101e7867de45e3c4b1e951a4d5109b1b.scope. Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit: BPF prog-id=73 op=LOAD Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1832 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643965363763653466366130376239666462656466343262306166 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1832 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643965363763653466366130376239666462656466343262306166 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.616000 audit: BPF prog-id=74 op=LOAD Dec 13 14:21:06.616000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000386370 items=0 ppid=1832 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643965363763653466366130376239666462656466343262306166 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit: BPF prog-id=75 op=LOAD Dec 13 14:21:06.617000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003863b8 items=0 ppid=1832 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643965363763653466366130376239666462656466343262306166 Dec 13 14:21:06.617000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:21:06.617000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { perfmon } for pid=1932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit[1932]: AVC avc: denied { bpf } for pid=1932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.617000 audit: BPF prog-id=76 op=LOAD Dec 13 14:21:06.617000 audit[1932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003867c8 items=0 ppid=1832 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643965363763653466366130376239666462656466343262306166 Dec 13 14:21:06.632181 env[1228]: time="2024-12-13T14:21:06.632115623Z" level=info msg="CreateContainer within sandbox \"57c95fc362d53c640844ecbcfa58f4e04d59762c3c13a95cdc25a4522e9f2494\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"187093f8d41b705f9fc249d56d71e00e7520b213b336d4ab77ad2297fe1d9a02\"" Dec 13 14:21:06.638188 env[1228]: time="2024-12-13T14:21:06.638144463Z" level=info msg="StartContainer for \"187093f8d41b705f9fc249d56d71e00e7520b213b336d4ab77ad2297fe1d9a02\"" Dec 13 14:21:06.644015 kubelet[1775]: W1213 14:21:06.643792 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.72:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.644015 kubelet[1775]: E1213 14:21:06.643963 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.72:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.644481 env[1228]: time="2024-12-13T14:21:06.644420576Z" level=info msg="CreateContainer within sandbox \"8f9a24ad71016b65cf94f0e486564afa964407629d1ae786a941ce2a444e6122\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2565396d2af8890e762634802975ab4922664dcfc0b775ad7fe00024fe2ed3ee\"" Dec 13 14:21:06.647188 env[1228]: time="2024-12-13T14:21:06.647149090Z" level=info msg="StartContainer for \"2565396d2af8890e762634802975ab4922664dcfc0b775ad7fe00024fe2ed3ee\"" Dec 13 14:21:06.682485 env[1228]: time="2024-12-13T14:21:06.682428268Z" level=info msg="StartContainer for \"aad9e67ce4f6a07b9fdbedf42b0af9a1101e7867de45e3c4b1e951a4d5109b1b\" returns successfully" Dec 13 14:21:06.694133 systemd[1]: Started cri-containerd-187093f8d41b705f9fc249d56d71e00e7520b213b336d4ab77ad2297fe1d9a02.scope. Dec 13 14:21:06.710016 systemd[1]: Started cri-containerd-2565396d2af8890e762634802975ab4922664dcfc0b775ad7fe00024fe2ed3ee.scope. Dec 13 14:21:06.712285 kubelet[1775]: E1213 14:21:06.712227 1775 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.72:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.72:6443: connect: connection refused" interval="1.6s" Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.754000 audit: BPF prog-id=77 op=LOAD Dec 13 14:21:06.756000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.756000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1817 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363533393664326166383839306537363236333438303239373561 Dec 13 14:21:06.756000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.756000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1817 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363533393664326166383839306537363236333438303239373561 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.757000 audit: BPF prog-id=78 op=LOAD Dec 13 14:21:06.757000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035f600 items=0 ppid=1817 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363533393664326166383839306537363236333438303239373561 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.758000 audit: BPF prog-id=79 op=LOAD Dec 13 14:21:06.758000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035f648 items=0 ppid=1817 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363533393664326166383839306537363236333438303239373561 Dec 13 14:21:06.759000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:21:06.759000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.759000 audit: BPF prog-id=80 op=LOAD Dec 13 14:21:06.759000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035fa58 items=0 ppid=1817 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363533393664326166383839306537363236333438303239373561 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.766000 audit: BPF prog-id=81 op=LOAD Dec 13 14:21:06.768000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.768000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1837 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373039336638643431623730356639666332343964353664373165 Dec 13 14:21:06.768000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.768000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1837 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373039336638643431623730356639666332343964353664373165 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.769000 audit: BPF prog-id=82 op=LOAD Dec 13 14:21:06.769000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000243a0 items=0 ppid=1837 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373039336638643431623730356639666332343964353664373165 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.770000 audit: BPF prog-id=83 op=LOAD Dec 13 14:21:06.770000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000243e8 items=0 ppid=1837 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373039336638643431623730356639666332343964353664373165 Dec 13 14:21:06.771000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:21:06.771000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { perfmon } for pid=1972 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit[1972]: AVC avc: denied { bpf } for pid=1972 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:06.771000 audit: BPF prog-id=84 op=LOAD Dec 13 14:21:06.771000 audit[1972]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000247f8 items=0 ppid=1837 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:06.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373039336638643431623730356639666332343964353664373165 Dec 13 14:21:06.777460 kubelet[1775]: W1213 14:21:06.776412 1775 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.72:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.777460 kubelet[1775]: E1213 14:21:06.776509 1775 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.72:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.72:6443: connect: connection refused Dec 13 14:21:06.830845 env[1228]: time="2024-12-13T14:21:06.830776174Z" level=info msg="StartContainer for \"2565396d2af8890e762634802975ab4922664dcfc0b775ad7fe00024fe2ed3ee\" returns successfully" Dec 13 14:21:06.834085 kubelet[1775]: I1213 14:21:06.833966 1775 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:06.834430 kubelet[1775]: E1213 14:21:06.834391 1775 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.72:6443/api/v1/nodes\": dial tcp 10.128.0.72:6443: connect: connection refused" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:06.884034 env[1228]: time="2024-12-13T14:21:06.883980454Z" level=info msg="StartContainer for \"187093f8d41b705f9fc249d56d71e00e7520b213b336d4ab77ad2297fe1d9a02\" returns successfully" Dec 13 14:21:08.439918 kubelet[1775]: I1213 14:21:08.439866 1775 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:09.204000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.210622 kernel: kauditd_printk_skb: 560 callbacks suppressed Dec 13 14:21:09.210801 kernel: audit: type=1400 audit(1734099669.204:547): avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.204000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00440e000 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.279911 kernel: audit: type=1300 audit(1734099669.204:547): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00440e000 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.322917 kernel: audit: type=1327 audit(1734099669.204:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.204000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.356499 kernel: audit: type=1400 audit(1734099669.204:548): avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.204000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0065d5f00 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.396924 kernel: audit: type=1300 audit(1734099669.204:548): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0065d5f00 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.205000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.460831 kernel: audit: type=1327 audit(1734099669.204:548): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.461027 kernel: audit: type=1400 audit(1734099669.205:549): avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.205000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00440e180 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.525088 kernel: audit: type=1300 audit(1734099669.205:549): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00440e180 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.525258 kernel: audit: type=1327 audit(1734099669.205:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.552324 kernel: audit: type=1400 audit(1734099669.237:550): avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.237000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.237000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c006780ea0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.272000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.272000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0047dc0a0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.272000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.272000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:09.272000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006675e00 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:21:09.272000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:21:09.638272 kubelet[1775]: E1213 14:21:09.638215 1775 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:09.703598 kubelet[1775]: I1213 14:21:09.703528 1775 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:10.106000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:10.106000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009b6150 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:10.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:10.106000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:10.106000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00086c120 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:10.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:10.264320 kubelet[1775]: I1213 14:21:10.264279 1775 apiserver.go:52] "Watching apiserver" Dec 13 14:21:10.306991 kubelet[1775]: I1213 14:21:10.306953 1775 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:21:11.775448 systemd[1]: Reloading. Dec 13 14:21:11.888604 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-12-13T14:21:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:21:11.888650 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-12-13T14:21:11Z" level=info msg="torcx already run" Dec 13 14:21:11.994051 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:21:11.994080 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:21:12.021194 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit: BPF prog-id=85 op=LOAD Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.131000 audit: BPF prog-id=86 op=LOAD Dec 13 14:21:12.131000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:21:12.131000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit: BPF prog-id=87 op=LOAD Dec 13 14:21:12.138000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit: BPF prog-id=88 op=LOAD Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.138000 audit: BPF prog-id=89 op=LOAD Dec 13 14:21:12.138000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:21:12.138000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.140000 audit: BPF prog-id=90 op=LOAD Dec 13 14:21:12.140000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.142000 audit: BPF prog-id=91 op=LOAD Dec 13 14:21:12.142000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.143000 audit: BPF prog-id=92 op=LOAD Dec 13 14:21:12.143000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.144000 audit: BPF prog-id=93 op=LOAD Dec 13 14:21:12.144000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.145000 audit: BPF prog-id=94 op=LOAD Dec 13 14:21:12.146000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit: BPF prog-id=95 op=LOAD Dec 13 14:21:12.147000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.148000 audit: BPF prog-id=96 op=LOAD Dec 13 14:21:12.148000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit: BPF prog-id=97 op=LOAD Dec 13 14:21:12.149000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit: BPF prog-id=98 op=LOAD Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.149000 audit: BPF prog-id=99 op=LOAD Dec 13 14:21:12.149000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:21:12.149000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.151000 audit: BPF prog-id=100 op=LOAD Dec 13 14:21:12.152000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.155000 audit: BPF prog-id=101 op=LOAD Dec 13 14:21:12.155000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit: BPF prog-id=102 op=LOAD Dec 13 14:21:12.157000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit: BPF prog-id=103 op=LOAD Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.157000 audit: BPF prog-id=104 op=LOAD Dec 13 14:21:12.157000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:21:12.157000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.158000 audit: BPF prog-id=105 op=LOAD Dec 13 14:21:12.158000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:21:12.182737 kubelet[1775]: E1213 14:21:12.182561 1775 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal.1810c2753a112aac default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,UID:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,LastTimestamp:2024-12-13 14:21:05.2788067 +0000 UTC m=+0.470320901,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal,}" Dec 13 14:21:12.183251 systemd[1]: Stopping kubelet.service... Dec 13 14:21:12.205436 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:21:12.205773 systemd[1]: Stopped kubelet.service. Dec 13 14:21:12.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:12.208752 systemd[1]: Starting kubelet.service... Dec 13 14:21:12.405975 systemd[1]: Started kubelet.service. Dec 13 14:21:12.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:12.497663 kubelet[2112]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:12.497663 kubelet[2112]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:21:12.497663 kubelet[2112]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:21:12.498294 kubelet[2112]: I1213 14:21:12.497738 2112 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:21:12.504159 kubelet[2112]: I1213 14:21:12.504121 2112 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:21:12.504159 kubelet[2112]: I1213 14:21:12.504152 2112 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:21:12.504475 kubelet[2112]: I1213 14:21:12.504449 2112 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:21:12.506183 kubelet[2112]: I1213 14:21:12.506144 2112 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:21:12.507808 kubelet[2112]: I1213 14:21:12.507783 2112 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:21:12.518290 kubelet[2112]: I1213 14:21:12.518238 2112 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:21:12.518697 kubelet[2112]: I1213 14:21:12.518640 2112 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:21:12.519722 kubelet[2112]: I1213 14:21:12.518699 2112 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:21:12.520025 kubelet[2112]: I1213 14:21:12.520006 2112 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:21:12.520134 kubelet[2112]: I1213 14:21:12.520121 2112 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:21:12.520284 kubelet[2112]: I1213 14:21:12.520271 2112 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:12.520526 kubelet[2112]: I1213 14:21:12.520510 2112 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:21:12.520646 kubelet[2112]: I1213 14:21:12.520632 2112 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:21:12.520819 kubelet[2112]: I1213 14:21:12.520804 2112 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:21:12.520952 kubelet[2112]: I1213 14:21:12.520938 2112 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:21:12.538067 kubelet[2112]: I1213 14:21:12.538033 2112 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:21:12.538342 kubelet[2112]: I1213 14:21:12.538322 2112 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:21:12.539018 kubelet[2112]: I1213 14:21:12.538994 2112 server.go:1264] "Started kubelet" Dec 13 14:21:12.539000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:12.539000 audit[2112]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000548e10 a1=c000c783f0 a2=c000548d50 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:12.539000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:12.539000 audit[2112]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000141520 a1=c000c78408 a2=c0005490b0 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:12.545254 kubelet[2112]: I1213 14:21:12.541657 2112 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:21:12.545254 kubelet[2112]: I1213 14:21:12.541731 2112 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:21:12.545254 kubelet[2112]: I1213 14:21:12.541766 2112 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:21:12.549201 kubelet[2112]: I1213 14:21:12.549141 2112 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:21:12.553590 kubelet[2112]: I1213 14:21:12.550805 2112 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:21:12.556508 kubelet[2112]: I1213 14:21:12.552082 2112 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:21:12.557003 kubelet[2112]: I1213 14:21:12.556930 2112 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:21:12.557408 kubelet[2112]: I1213 14:21:12.557387 2112 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:21:12.557859 kubelet[2112]: I1213 14:21:12.552096 2112 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:21:12.558234 kubelet[2112]: I1213 14:21:12.558215 2112 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:21:12.562221 kubelet[2112]: I1213 14:21:12.562190 2112 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:21:12.564866 kubelet[2112]: I1213 14:21:12.564839 2112 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:21:12.565050 kubelet[2112]: I1213 14:21:12.565026 2112 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:21:12.565172 kubelet[2112]: I1213 14:21:12.565156 2112 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:21:12.565331 kubelet[2112]: E1213 14:21:12.565308 2112 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:21:12.568284 kubelet[2112]: I1213 14:21:12.568253 2112 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:21:12.568284 kubelet[2112]: I1213 14:21:12.568283 2112 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:21:12.568472 kubelet[2112]: I1213 14:21:12.568399 2112 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:21:12.629912 kubelet[2112]: I1213 14:21:12.629804 2112 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:21:12.630111 kubelet[2112]: I1213 14:21:12.630003 2112 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:21:12.630111 kubelet[2112]: I1213 14:21:12.630040 2112 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:21:12.630309 kubelet[2112]: I1213 14:21:12.630283 2112 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:21:12.630384 kubelet[2112]: I1213 14:21:12.630309 2112 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:21:12.630384 kubelet[2112]: I1213 14:21:12.630338 2112 policy_none.go:49] "None policy: Start" Dec 13 14:21:12.631308 kubelet[2112]: I1213 14:21:12.631268 2112 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:21:12.631308 kubelet[2112]: I1213 14:21:12.631306 2112 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:21:12.631514 kubelet[2112]: I1213 14:21:12.631501 2112 state_mem.go:75] "Updated machine memory state" Dec 13 14:21:12.637573 kubelet[2112]: I1213 14:21:12.637546 2112 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:21:12.636000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:12.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:21:12.636000 audit[2112]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeb3e0 a1=c000baad20 a2=c000aeb3b0 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:21:12.639005 kubelet[2112]: I1213 14:21:12.638977 2112 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:21:12.639435 kubelet[2112]: I1213 14:21:12.639339 2112 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:21:12.640135 kubelet[2112]: I1213 14:21:12.640113 2112 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:21:12.662071 kubelet[2112]: I1213 14:21:12.661946 2112 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.665666 kubelet[2112]: I1213 14:21:12.665619 2112 topology_manager.go:215] "Topology Admit Handler" podUID="de95dc37091579a9bf1537dacc59013b" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.665969 kubelet[2112]: I1213 14:21:12.665941 2112 topology_manager.go:215] "Topology Admit Handler" podUID="5284441df75da42ded151c017b903893" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.666221 kubelet[2112]: I1213 14:21:12.666194 2112 topology_manager.go:215] "Topology Admit Handler" podUID="5e97f6f790c77a53e9b6bffee1a2c50d" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.677458 kubelet[2112]: I1213 14:21:12.677427 2112 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.677700 kubelet[2112]: I1213 14:21:12.677686 2112 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.679616 kubelet[2112]: W1213 14:21:12.679587 2112 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:21:12.682380 kubelet[2112]: W1213 14:21:12.682355 2112 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:21:12.682795 kubelet[2112]: W1213 14:21:12.682773 2112 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:21:12.759788 kubelet[2112]: I1213 14:21:12.759739 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.759788 kubelet[2112]: I1213 14:21:12.759795 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760077 kubelet[2112]: I1213 14:21:12.759830 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760077 kubelet[2112]: I1213 14:21:12.759860 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760077 kubelet[2112]: I1213 14:21:12.759915 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760077 kubelet[2112]: I1213 14:21:12.759946 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5e97f6f790c77a53e9b6bffee1a2c50d-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5e97f6f790c77a53e9b6bffee1a2c50d\") " pod="kube-system/kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760441 kubelet[2112]: I1213 14:21:12.759980 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760441 kubelet[2112]: I1213 14:21:12.760005 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/de95dc37091579a9bf1537dacc59013b-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"de95dc37091579a9bf1537dacc59013b\") " pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:12.760441 kubelet[2112]: I1213 14:21:12.760033 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5284441df75da42ded151c017b903893-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" (UID: \"5284441df75da42ded151c017b903893\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:21:13.524334 kubelet[2112]: I1213 14:21:13.524276 2112 apiserver.go:52] "Watching apiserver" Dec 13 14:21:13.558908 kubelet[2112]: I1213 14:21:13.558844 2112 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:21:13.632263 kubelet[2112]: I1213 14:21:13.631952 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" podStartSLOduration=1.631930968 podStartE2EDuration="1.631930968s" podCreationTimestamp="2024-12-13 14:21:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:13.631052021 +0000 UTC m=+1.218105511" watchObservedRunningTime="2024-12-13 14:21:13.631930968 +0000 UTC m=+1.218984435" Dec 13 14:21:13.650466 kubelet[2112]: I1213 14:21:13.650370 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" podStartSLOduration=1.650342725 podStartE2EDuration="1.650342725s" podCreationTimestamp="2024-12-13 14:21:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:13.64057166 +0000 UTC m=+1.227625134" watchObservedRunningTime="2024-12-13 14:21:13.650342725 +0000 UTC m=+1.237396192" Dec 13 14:21:13.662172 kubelet[2112]: I1213 14:21:13.662096 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" podStartSLOduration=1.6620706250000001 podStartE2EDuration="1.662070625s" podCreationTimestamp="2024-12-13 14:21:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:13.650854984 +0000 UTC m=+1.237908453" watchObservedRunningTime="2024-12-13 14:21:13.662070625 +0000 UTC m=+1.249124093" Dec 13 14:21:16.246977 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 14:21:16.247135 kernel: audit: type=1400 audit(1734099676.234:804): avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.234000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.237000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.295924 kernel: audit: type=1400 audit(1734099676.237:805): avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.237000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e37e0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.330929 kernel: audit: type=1300 audit(1734099676.237:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e37e0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.237000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.385797 kernel: audit: type=1327 audit(1734099676.237:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.385957 kernel: audit: type=1400 audit(1734099676.237:806): avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.237000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e3820 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.421916 kernel: audit: type=1300 audit(1734099676.237:806): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e3820 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.237000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.477687 kernel: audit: type=1327 audit(1734099676.237:806): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.477865 kernel: audit: type=1400 audit(1734099676.237:807): avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:16.237000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e3860 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.513013 kernel: audit: type=1300 audit(1734099676.237:807): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016e3860 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.542940 kernel: audit: type=1327 audit(1734099676.237:807): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.234000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001614a60 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:16.432000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:21:16.432000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c5a600 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:21:16.432000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:17.238135 update_engine[1217]: I1213 14:21:17.238073 1217 update_attempter.cc:509] Updating boot flags... Dec 13 14:21:18.804196 sudo[1446]: pam_unix(sudo:session): session closed for user root Dec 13 14:21:18.803000 audit[1446]: USER_END pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:18.803000 audit[1446]: CRED_DISP pid=1446 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:21:18.848301 sshd[1443]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:18.849000 audit[1443]: USER_END pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:21:18.850000 audit[1443]: CRED_DISP pid=1443 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:21:18.853418 systemd[1]: sshd@6-10.128.0.72:22-139.178.68.195:51456.service: Deactivated successfully. Dec 13 14:21:18.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.72:22-139.178.68.195:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:18.854640 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:21:18.854857 systemd[1]: session-7.scope: Consumed 5.692s CPU time. Dec 13 14:21:18.855564 systemd-logind[1240]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:21:18.856920 systemd-logind[1240]: Removed session 7. Dec 13 14:21:27.690066 kubelet[2112]: I1213 14:21:27.690015 2112 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:21:27.690720 env[1228]: time="2024-12-13T14:21:27.690659941Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:21:27.691192 kubelet[2112]: I1213 14:21:27.691018 2112 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:21:28.157774 kubelet[2112]: I1213 14:21:28.157618 2112 topology_manager.go:215] "Topology Admit Handler" podUID="25178b75-512a-4d21-8cd3-c977c52eb832" podNamespace="kube-system" podName="kube-proxy-smk9z" Dec 13 14:21:28.166653 systemd[1]: Created slice kubepods-besteffort-pod25178b75_512a_4d21_8cd3_c977c52eb832.slice. Dec 13 14:21:28.291023 kubelet[2112]: I1213 14:21:28.290962 2112 topology_manager.go:215] "Topology Admit Handler" podUID="e79609af-a472-4fa6-b3e1-634bb6e841fa" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-d8m9f" Dec 13 14:21:28.299154 systemd[1]: Created slice kubepods-besteffort-pode79609af_a472_4fa6_b3e1_634bb6e841fa.slice. Dec 13 14:21:28.325269 kubelet[2112]: I1213 14:21:28.325215 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/25178b75-512a-4d21-8cd3-c977c52eb832-lib-modules\") pod \"kube-proxy-smk9z\" (UID: \"25178b75-512a-4d21-8cd3-c977c52eb832\") " pod="kube-system/kube-proxy-smk9z" Dec 13 14:21:28.325520 kubelet[2112]: I1213 14:21:28.325279 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/25178b75-512a-4d21-8cd3-c977c52eb832-kube-proxy\") pod \"kube-proxy-smk9z\" (UID: \"25178b75-512a-4d21-8cd3-c977c52eb832\") " pod="kube-system/kube-proxy-smk9z" Dec 13 14:21:28.325520 kubelet[2112]: I1213 14:21:28.325306 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/25178b75-512a-4d21-8cd3-c977c52eb832-xtables-lock\") pod \"kube-proxy-smk9z\" (UID: \"25178b75-512a-4d21-8cd3-c977c52eb832\") " pod="kube-system/kube-proxy-smk9z" Dec 13 14:21:28.325520 kubelet[2112]: I1213 14:21:28.325334 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b5k5q\" (UniqueName: \"kubernetes.io/projected/25178b75-512a-4d21-8cd3-c977c52eb832-kube-api-access-b5k5q\") pod \"kube-proxy-smk9z\" (UID: \"25178b75-512a-4d21-8cd3-c977c52eb832\") " pod="kube-system/kube-proxy-smk9z" Dec 13 14:21:28.425598 kubelet[2112]: I1213 14:21:28.425523 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e79609af-a472-4fa6-b3e1-634bb6e841fa-var-lib-calico\") pod \"tigera-operator-7bc55997bb-d8m9f\" (UID: \"e79609af-a472-4fa6-b3e1-634bb6e841fa\") " pod="tigera-operator/tigera-operator-7bc55997bb-d8m9f" Dec 13 14:21:28.425598 kubelet[2112]: I1213 14:21:28.425603 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xjznn\" (UniqueName: \"kubernetes.io/projected/e79609af-a472-4fa6-b3e1-634bb6e841fa-kube-api-access-xjznn\") pod \"tigera-operator-7bc55997bb-d8m9f\" (UID: \"e79609af-a472-4fa6-b3e1-634bb6e841fa\") " pod="tigera-operator/tigera-operator-7bc55997bb-d8m9f" Dec 13 14:21:28.478333 env[1228]: time="2024-12-13T14:21:28.478275027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-smk9z,Uid:25178b75-512a-4d21-8cd3-c977c52eb832,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:28.521183 env[1228]: time="2024-12-13T14:21:28.516438501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:28.521183 env[1228]: time="2024-12-13T14:21:28.516495932Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:28.521183 env[1228]: time="2024-12-13T14:21:28.516515392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:28.521183 env[1228]: time="2024-12-13T14:21:28.516687026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562 pid=2216 runtime=io.containerd.runc.v2 Dec 13 14:21:28.551156 systemd[1]: run-containerd-runc-k8s.io-ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562-runc.KYDKDm.mount: Deactivated successfully. Dec 13 14:21:28.565810 systemd[1]: Started cri-containerd-ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562.scope. Dec 13 14:21:28.611173 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 14:21:28.611362 kernel: audit: type=1400 audit(1734099688.584:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.633105 kernel: audit: type=1400 audit(1734099688.584:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.633168 env[1228]: time="2024-12-13T14:21:28.612693918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-d8m9f,Uid:e79609af-a472-4fa6-b3e1-634bb6e841fa,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.676275 kernel: audit: type=1400 audit(1734099688.584:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.676345 kernel: audit: type=1400 audit(1734099688.584:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.676386 kernel: audit: type=1400 audit(1734099688.584:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.720828 env[1228]: time="2024-12-13T14:21:28.720710441Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:28.721520 env[1228]: time="2024-12-13T14:21:28.721440567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:28.721738 env[1228]: time="2024-12-13T14:21:28.721692565Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:28.722171 env[1228]: time="2024-12-13T14:21:28.722113983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b529811a03e4398dcf3c45d3bf8beeeba957c0ca2897f47aef7103cd332fd6a0 pid=2252 runtime=io.containerd.runc.v2 Dec 13 14:21:28.729049 kernel: audit: type=1400 audit(1734099688.584:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.768685 systemd[1]: Started cri-containerd-b529811a03e4398dcf3c45d3bf8beeeba957c0ca2897f47aef7103cd332fd6a0.scope. Dec 13 14:21:28.785791 kernel: audit: type=1400 audit(1734099688.584:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.785974 kernel: audit: type=1400 audit(1734099688.584:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.786018 kernel: audit: type=1400 audit(1734099688.584:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.787189 env[1228]: time="2024-12-13T14:21:28.787137298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-smk9z,Uid:25178b75-512a-4d21-8cd3-c977c52eb832,Namespace:kube-system,Attempt:0,} returns sandbox id \"ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562\"" Dec 13 14:21:28.793290 env[1228]: time="2024-12-13T14:21:28.793242588Z" level=info msg="CreateContainer within sandbox \"ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:21:28.799031 kernel: audit: type=1400 audit(1734099688.610:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.610000 audit: BPF prog-id=106 op=LOAD Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2216 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643831623332353266323439383636373433643939653561356136 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2216 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643831623332353266323439383636373433643939653561356136 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit: BPF prog-id=107 op=LOAD Dec 13 14:21:28.611000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000184bd0 items=0 ppid=2216 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643831623332353266323439383636373433643939653561356136 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit: BPF prog-id=108 op=LOAD Dec 13 14:21:28.611000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000184c18 items=0 ppid=2216 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643831623332353266323439383636373433643939653561356136 Dec 13 14:21:28.611000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:21:28.611000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { perfmon } for pid=2225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit[2225]: AVC avc: denied { bpf } for pid=2225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.611000 audit: BPF prog-id=109 op=LOAD Dec 13 14:21:28.611000 audit[2225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000185028 items=0 ppid=2216 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643831623332353266323439383636373433643939653561356136 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.838000 audit: BPF prog-id=110 op=LOAD Dec 13 14:21:28.839000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.839000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2252 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323938313161303365343339386463663363343564336266386265 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2252 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323938313161303365343339386463663363343564336266386265 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.840000 audit: BPF prog-id=111 op=LOAD Dec 13 14:21:28.840000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bec10 items=0 ppid=2252 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323938313161303365343339386463663363343564336266386265 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.841000 audit: BPF prog-id=112 op=LOAD Dec 13 14:21:28.841000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bec58 items=0 ppid=2252 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323938313161303365343339386463663363343564336266386265 Dec 13 14:21:28.842000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:21:28.842000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.843000 audit: BPF prog-id=113 op=LOAD Dec 13 14:21:28.843000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bf068 items=0 ppid=2252 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235323938313161303365343339386463663363343564336266386265 Dec 13 14:21:28.850612 env[1228]: time="2024-12-13T14:21:28.847845090Z" level=info msg="CreateContainer within sandbox \"ded81b3252f249866743d99e5a5a663fc5b3dc59fa28cde511bec33c2f716562\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"28355722e0559e9bea445b39314096cb5b4e65d2bcd386516b702f92c9590e80\"" Dec 13 14:21:28.857352 env[1228]: time="2024-12-13T14:21:28.857311522Z" level=info msg="StartContainer for \"28355722e0559e9bea445b39314096cb5b4e65d2bcd386516b702f92c9590e80\"" Dec 13 14:21:28.885817 systemd[1]: Started cri-containerd-28355722e0559e9bea445b39314096cb5b4e65d2bcd386516b702f92c9590e80.scope. Dec 13 14:21:28.916133 env[1228]: time="2024-12-13T14:21:28.916070800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-d8m9f,Uid:e79609af-a472-4fa6-b3e1-634bb6e841fa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b529811a03e4398dcf3c45d3bf8beeeba957c0ca2897f47aef7103cd332fd6a0\"" Dec 13 14:21:28.922926 env[1228]: time="2024-12-13T14:21:28.921796873Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f73a564fcb8 items=0 ppid=2216 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238333535373232653035353965396265613434356233393331343039 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.941000 audit: BPF prog-id=114 op=LOAD Dec 13 14:21:28.941000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b66c8 items=0 ppid=2216 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238333535373232653035353965396265613434356233393331343039 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit: BPF prog-id=115 op=LOAD Dec 13 14:21:28.942000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6718 items=0 ppid=2216 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238333535373232653035353965396265613434356233393331343039 Dec 13 14:21:28.942000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:21:28.942000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:28.942000 audit: BPF prog-id=116 op=LOAD Dec 13 14:21:28.942000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b67a8 items=0 ppid=2216 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:28.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238333535373232653035353965396265613434356233393331343039 Dec 13 14:21:28.967604 env[1228]: time="2024-12-13T14:21:28.967529772Z" level=info msg="StartContainer for \"28355722e0559e9bea445b39314096cb5b4e65d2bcd386516b702f92c9590e80\" returns successfully" Dec 13 14:21:29.070000 audit[2358]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.070000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8dc988e0 a2=0 a3=7ffe8dc988cc items=0 ppid=2316 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:21:29.073000 audit[2359]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.073000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd66417360 a2=0 a3=7ffd6641734c items=0 ppid=2316 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:21:29.075000 audit[2360]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.075000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb2f3f940 a2=0 a3=7ffcb2f3f92c items=0 ppid=2316 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:21:29.078000 audit[2361]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.078000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9f25daf0 a2=0 a3=7ffe9f25dadc items=0 ppid=2316 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:21:29.081000 audit[2362]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.081000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb6513320 a2=0 a3=7fffb651330c items=0 ppid=2316 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:21:29.083000 audit[2363]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.083000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0cbb74b0 a2=0 a3=7ffc0cbb749c items=0 ppid=2316 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:21:29.173000 audit[2364]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.173000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffedcb90710 a2=0 a3=7ffedcb906fc items=0 ppid=2316 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:21:29.179000 audit[2366]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.179000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd6a95a750 a2=0 a3=7ffd6a95a73c items=0 ppid=2316 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:21:29.186000 audit[2369]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.186000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc472ca50 a2=0 a3=7ffdc472ca3c items=0 ppid=2316 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:21:29.188000 audit[2370]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.188000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe86de55e0 a2=0 a3=7ffe86de55cc items=0 ppid=2316 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:21:29.193000 audit[2372]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.193000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd86d19e20 a2=0 a3=7ffd86d19e0c items=0 ppid=2316 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:21:29.195000 audit[2373]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.195000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdec7e1e00 a2=0 a3=7ffdec7e1dec items=0 ppid=2316 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:21:29.200000 audit[2375]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.200000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe71c72d10 a2=0 a3=7ffe71c72cfc items=0 ppid=2316 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:21:29.206000 audit[2378]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.206000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed82d6820 a2=0 a3=7ffed82d680c items=0 ppid=2316 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:21:29.208000 audit[2379]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.208000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa68b65f0 a2=0 a3=7fffa68b65dc items=0 ppid=2316 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:21:29.212000 audit[2381]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.212000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc28c4f790 a2=0 a3=7ffc28c4f77c items=0 ppid=2316 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:21:29.214000 audit[2382]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.214000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaa3969a0 a2=0 a3=7ffcaa39698c items=0 ppid=2316 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:21:29.218000 audit[2384]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.218000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf4f06f00 a2=0 a3=7ffdf4f06eec items=0 ppid=2316 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:29.224000 audit[2387]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.224000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff528ffad0 a2=0 a3=7fff528ffabc items=0 ppid=2316 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:29.230000 audit[2390]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.230000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddb733ce0 a2=0 a3=7ffddb733ccc items=0 ppid=2316 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:21:29.232000 audit[2391]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.232000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7be32c50 a2=0 a3=7ffe7be32c3c items=0 ppid=2316 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:21:29.236000 audit[2393]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.236000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffea7d5f900 a2=0 a3=7ffea7d5f8ec items=0 ppid=2316 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:29.242000 audit[2396]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.242000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7b372480 a2=0 a3=7ffd7b37246c items=0 ppid=2316 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:29.244000 audit[2397]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.244000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35534e30 a2=0 a3=7ffe35534e1c items=0 ppid=2316 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:21:29.248000 audit[2399]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:21:29.248000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc9847f250 a2=0 a3=7ffc9847f23c items=0 ppid=2316 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:21:29.283000 audit[2405]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:29.283000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffda7529e70 a2=0 a3=7ffda7529e5c items=0 ppid=2316 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:29.294000 audit[2405]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:29.294000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffda7529e70 a2=0 a3=7ffda7529e5c items=0 ppid=2316 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:29.296000 audit[2410]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.296000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc28509440 a2=0 a3=7ffc2850942c items=0 ppid=2316 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:21:29.301000 audit[2412]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.301000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc1919d090 a2=0 a3=7ffc1919d07c items=0 ppid=2316 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:21:29.308000 audit[2415]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.308000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8d18fde0 a2=0 a3=7fff8d18fdcc items=0 ppid=2316 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:21:29.309000 audit[2416]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.309000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd98879220 a2=0 a3=7ffd9887920c items=0 ppid=2316 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:21:29.313000 audit[2418]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.313000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefe57bc60 a2=0 a3=7ffefe57bc4c items=0 ppid=2316 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:21:29.315000 audit[2419]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.315000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3f7efa70 a2=0 a3=7fff3f7efa5c items=0 ppid=2316 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:21:29.319000 audit[2421]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.319000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4a707830 a2=0 a3=7fff4a70781c items=0 ppid=2316 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:21:29.324000 audit[2424]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.324000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff6760d9b0 a2=0 a3=7fff6760d99c items=0 ppid=2316 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:21:29.326000 audit[2425]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.326000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd625ae7f0 a2=0 a3=7ffd625ae7dc items=0 ppid=2316 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:21:29.330000 audit[2427]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.330000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3bd2c0c0 a2=0 a3=7ffc3bd2c0ac items=0 ppid=2316 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:21:29.331000 audit[2428]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.331000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffeef602f0 a2=0 a3=7fffeef602dc items=0 ppid=2316 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:21:29.336000 audit[2430]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.336000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4e046000 a2=0 a3=7ffc4e045fec items=0 ppid=2316 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:21:29.342000 audit[2433]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.342000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff50a5c960 a2=0 a3=7fff50a5c94c items=0 ppid=2316 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:21:29.347000 audit[2436]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.347000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6a94f8c0 a2=0 a3=7fff6a94f8ac items=0 ppid=2316 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:21:29.349000 audit[2437]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.349000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2cd594a0 a2=0 a3=7ffd2cd5948c items=0 ppid=2316 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:21:29.352000 audit[2439]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.352000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf1ccc300 a2=0 a3=7ffdf1ccc2ec items=0 ppid=2316 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:29.358000 audit[2442]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.358000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd60304b70 a2=0 a3=7ffd60304b5c items=0 ppid=2316 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:21:29.360000 audit[2443]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.360000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6d3f8b90 a2=0 a3=7ffc6d3f8b7c items=0 ppid=2316 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:21:29.365000 audit[2445]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.365000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd843cc380 a2=0 a3=7ffd843cc36c items=0 ppid=2316 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:21:29.367000 audit[2446]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.367000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa0e56690 a2=0 a3=7fffa0e5667c items=0 ppid=2316 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:21:29.371000 audit[2448]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.371000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe618cb370 a2=0 a3=7ffe618cb35c items=0 ppid=2316 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:29.376000 audit[2451]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:21:29.376000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc264fcd80 a2=0 a3=7ffc264fcd6c items=0 ppid=2316 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:21:29.381000 audit[2453]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:21:29.381000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdee61d7e0 a2=0 a3=7ffdee61d7cc items=0 ppid=2316 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.381000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:29.381000 audit[2453]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:21:29.381000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdee61d7e0 a2=0 a3=7ffdee61d7cc items=0 ppid=2316 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:29.381000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:29.659003 kubelet[2112]: I1213 14:21:29.653186 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-smk9z" podStartSLOduration=1.653159576 podStartE2EDuration="1.653159576s" podCreationTimestamp="2024-12-13 14:21:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:29.652429816 +0000 UTC m=+17.239483284" watchObservedRunningTime="2024-12-13 14:21:29.653159576 +0000 UTC m=+17.240213044" Dec 13 14:21:30.138486 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3551626376.mount: Deactivated successfully. Dec 13 14:21:31.766027 env[1228]: time="2024-12-13T14:21:31.765949720Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:31.768983 env[1228]: time="2024-12-13T14:21:31.768936104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:31.771746 env[1228]: time="2024-12-13T14:21:31.771677008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:31.774127 env[1228]: time="2024-12-13T14:21:31.774064892Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:31.775194 env[1228]: time="2024-12-13T14:21:31.775150774Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:21:31.779576 env[1228]: time="2024-12-13T14:21:31.779516758Z" level=info msg="CreateContainer within sandbox \"b529811a03e4398dcf3c45d3bf8beeeba957c0ca2897f47aef7103cd332fd6a0\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:21:31.798223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3878742279.mount: Deactivated successfully. Dec 13 14:21:31.808092 env[1228]: time="2024-12-13T14:21:31.808023067Z" level=info msg="CreateContainer within sandbox \"b529811a03e4398dcf3c45d3bf8beeeba957c0ca2897f47aef7103cd332fd6a0\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"31231e614b02353dc5d93cbc953774b732f0067d470608de527918a801c0c6eb\"" Dec 13 14:21:31.810593 env[1228]: time="2024-12-13T14:21:31.809040175Z" level=info msg="StartContainer for \"31231e614b02353dc5d93cbc953774b732f0067d470608de527918a801c0c6eb\"" Dec 13 14:21:31.857006 systemd[1]: Started cri-containerd-31231e614b02353dc5d93cbc953774b732f0067d470608de527918a801c0c6eb.scope. Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.873000 audit: BPF prog-id=117 op=LOAD Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2252 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323331653631346230323335336463356439336362633935333737 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2252 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323331653631346230323335336463356439336362633935333737 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit: BPF prog-id=118 op=LOAD Dec 13 14:21:31.874000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000188c60 items=0 ppid=2252 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323331653631346230323335336463356439336362633935333737 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit: BPF prog-id=119 op=LOAD Dec 13 14:21:31.874000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000188ca8 items=0 ppid=2252 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323331653631346230323335336463356439336362633935333737 Dec 13 14:21:31.874000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:21:31.874000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:31.874000 audit: BPF prog-id=120 op=LOAD Dec 13 14:21:31.874000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001890b8 items=0 ppid=2252 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323331653631346230323335336463356439336362633935333737 Dec 13 14:21:31.897141 env[1228]: time="2024-12-13T14:21:31.897072130Z" level=info msg="StartContainer for \"31231e614b02353dc5d93cbc953774b732f0067d470608de527918a801c0c6eb\" returns successfully" Dec 13 14:21:34.861000 audit[2496]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:34.867981 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:21:34.868222 kernel: audit: type=1325 audit(1734099694.861:925): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:34.861000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff8822d7a0 a2=0 a3=7fff8822d78c items=0 ppid=2316 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:34.917237 kernel: audit: type=1300 audit(1734099694.861:925): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff8822d7a0 a2=0 a3=7fff8822d78c items=0 ppid=2316 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:34.917423 kernel: audit: type=1327 audit(1734099694.861:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:34.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:34.938000 audit[2496]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:34.938000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8822d7a0 a2=0 a3=0 items=0 ppid=2316 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:34.987501 kernel: audit: type=1325 audit(1734099694.938:926): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:34.987698 kernel: audit: type=1300 audit(1734099694.938:926): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8822d7a0 a2=0 a3=0 items=0 ppid=2316 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:34.987757 kernel: audit: type=1327 audit(1734099694.938:926): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:34.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:35.132656 kubelet[2112]: I1213 14:21:35.132466 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-d8m9f" podStartSLOduration=4.273589236 podStartE2EDuration="7.132442593s" podCreationTimestamp="2024-12-13 14:21:28 +0000 UTC" firstStartedPulling="2024-12-13 14:21:28.917788755 +0000 UTC m=+16.504842206" lastFinishedPulling="2024-12-13 14:21:31.776642104 +0000 UTC m=+19.363695563" observedRunningTime="2024-12-13 14:21:32.664204361 +0000 UTC m=+20.251257827" watchObservedRunningTime="2024-12-13 14:21:35.132442593 +0000 UTC m=+22.719496061" Dec 13 14:21:35.133358 kubelet[2112]: I1213 14:21:35.132744 2112 topology_manager.go:215] "Topology Admit Handler" podUID="278f09c7-3afd-4e12-8099-cd9d94c91aa0" podNamespace="calico-system" podName="calico-typha-8649d69555-cncrn" Dec 13 14:21:35.141833 systemd[1]: Created slice kubepods-besteffort-pod278f09c7_3afd_4e12_8099_cd9d94c91aa0.slice. Dec 13 14:21:35.280904 kubelet[2112]: I1213 14:21:35.280830 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/278f09c7-3afd-4e12-8099-cd9d94c91aa0-typha-certs\") pod \"calico-typha-8649d69555-cncrn\" (UID: \"278f09c7-3afd-4e12-8099-cd9d94c91aa0\") " pod="calico-system/calico-typha-8649d69555-cncrn" Dec 13 14:21:35.281135 kubelet[2112]: I1213 14:21:35.280916 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r9hz5\" (UniqueName: \"kubernetes.io/projected/278f09c7-3afd-4e12-8099-cd9d94c91aa0-kube-api-access-r9hz5\") pod \"calico-typha-8649d69555-cncrn\" (UID: \"278f09c7-3afd-4e12-8099-cd9d94c91aa0\") " pod="calico-system/calico-typha-8649d69555-cncrn" Dec 13 14:21:35.281135 kubelet[2112]: I1213 14:21:35.280948 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/278f09c7-3afd-4e12-8099-cd9d94c91aa0-tigera-ca-bundle\") pod \"calico-typha-8649d69555-cncrn\" (UID: \"278f09c7-3afd-4e12-8099-cd9d94c91aa0\") " pod="calico-system/calico-typha-8649d69555-cncrn" Dec 13 14:21:35.305000 audit[2498]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:35.305000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff0879c530 a2=0 a3=7fff0879c51c items=0 ppid=2316 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.356663 kernel: audit: type=1325 audit(1734099695.305:927): table=filter:91 family=2 entries=17 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:35.356848 kernel: audit: type=1300 audit(1734099695.305:927): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff0879c530 a2=0 a3=7fff0879c51c items=0 ppid=2316 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:35.356000 audit[2498]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:35.388711 kernel: audit: type=1327 audit(1734099695.305:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:35.388921 kernel: audit: type=1325 audit(1734099695.356:928): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:35.356000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff0879c530 a2=0 a3=0 items=0 ppid=2316 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:35.446508 env[1228]: time="2024-12-13T14:21:35.446440505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8649d69555-cncrn,Uid:278f09c7-3afd-4e12-8099-cd9d94c91aa0,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:35.477794 env[1228]: time="2024-12-13T14:21:35.477670607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:35.478069 env[1228]: time="2024-12-13T14:21:35.477795248Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:35.478069 env[1228]: time="2024-12-13T14:21:35.477837936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:35.478220 env[1228]: time="2024-12-13T14:21:35.478061482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/00829536ebd700223b094ba740714aa32bd10779d55d24ecf3b4bfc4186f4a98 pid=2508 runtime=io.containerd.runc.v2 Dec 13 14:21:35.510688 systemd[1]: Started cri-containerd-00829536ebd700223b094ba740714aa32bd10779d55d24ecf3b4bfc4186f4a98.scope. Dec 13 14:21:35.524920 kubelet[2112]: I1213 14:21:35.523678 2112 topology_manager.go:215] "Topology Admit Handler" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" podNamespace="calico-system" podName="calico-node-6wjg2" Dec 13 14:21:35.532220 systemd[1]: Created slice kubepods-besteffort-podcfd4da52_b2fc_454d_a89b_b9dba229bf14.slice. Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.598000 audit: BPF prog-id=121 op=LOAD Dec 13 14:21:35.600000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.600000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2508 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030383239353336656264373030323233623039346261373430373134 Dec 13 14:21:35.601000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.601000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2508 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030383239353336656264373030323233623039346261373430373134 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.602000 audit: BPF prog-id=122 op=LOAD Dec 13 14:21:35.602000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025c00 items=0 ppid=2508 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030383239353336656264373030323233623039346261373430373134 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.604000 audit: BPF prog-id=123 op=LOAD Dec 13 14:21:35.604000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025c48 items=0 ppid=2508 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030383239353336656264373030323233623039346261373430373134 Dec 13 14:21:35.606000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:21:35.606000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { perfmon } for pid=2518 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit[2518]: AVC avc: denied { bpf } for pid=2518 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.606000 audit: BPF prog-id=124 op=LOAD Dec 13 14:21:35.606000 audit[2518]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035c058 items=0 ppid=2508 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030383239353336656264373030323233623039346261373430373134 Dec 13 14:21:35.635268 kubelet[2112]: I1213 14:21:35.635202 2112 topology_manager.go:215] "Topology Admit Handler" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" podNamespace="calico-system" podName="csi-node-driver-mc7jg" Dec 13 14:21:35.636333 kubelet[2112]: E1213 14:21:35.636026 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:35.684263 env[1228]: time="2024-12-13T14:21:35.684205664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8649d69555-cncrn,Uid:278f09c7-3afd-4e12-8099-cd9d94c91aa0,Namespace:calico-system,Attempt:0,} returns sandbox id \"00829536ebd700223b094ba740714aa32bd10779d55d24ecf3b4bfc4186f4a98\"" Dec 13 14:21:35.687837 env[1228]: time="2024-12-13T14:21:35.687789354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:21:35.692660 kubelet[2112]: I1213 14:21:35.691523 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4kbkq\" (UniqueName: \"kubernetes.io/projected/cfd4da52-b2fc-454d-a89b-b9dba229bf14-kube-api-access-4kbkq\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.692660 kubelet[2112]: I1213 14:21:35.691595 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e7222121-f624-4f42-98c6-6b74db8c612f-varrun\") pod \"csi-node-driver-mc7jg\" (UID: \"e7222121-f624-4f42-98c6-6b74db8c612f\") " pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:35.692660 kubelet[2112]: I1213 14:21:35.691625 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e7222121-f624-4f42-98c6-6b74db8c612f-registration-dir\") pod \"csi-node-driver-mc7jg\" (UID: \"e7222121-f624-4f42-98c6-6b74db8c612f\") " pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:35.692660 kubelet[2112]: I1213 14:21:35.691682 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tfhdv\" (UniqueName: \"kubernetes.io/projected/e7222121-f624-4f42-98c6-6b74db8c612f-kube-api-access-tfhdv\") pod \"csi-node-driver-mc7jg\" (UID: \"e7222121-f624-4f42-98c6-6b74db8c612f\") " pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:35.692660 kubelet[2112]: I1213 14:21:35.691712 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-run-calico\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693111 kubelet[2112]: I1213 14:21:35.691755 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-bin-dir\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693111 kubelet[2112]: I1213 14:21:35.691846 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e7222121-f624-4f42-98c6-6b74db8c612f-kubelet-dir\") pod \"csi-node-driver-mc7jg\" (UID: \"e7222121-f624-4f42-98c6-6b74db8c612f\") " pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:35.693111 kubelet[2112]: I1213 14:21:35.691881 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-policysync\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693111 kubelet[2112]: I1213 14:21:35.691942 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfd4da52-b2fc-454d-a89b-b9dba229bf14-tigera-ca-bundle\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693111 kubelet[2112]: I1213 14:21:35.691970 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-xtables-lock\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693378 kubelet[2112]: I1213 14:21:35.692017 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-lib-calico\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693378 kubelet[2112]: I1213 14:21:35.692044 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-net-dir\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693378 kubelet[2112]: I1213 14:21:35.692093 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-lib-modules\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693378 kubelet[2112]: I1213 14:21:35.692125 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e7222121-f624-4f42-98c6-6b74db8c612f-socket-dir\") pod \"csi-node-driver-mc7jg\" (UID: \"e7222121-f624-4f42-98c6-6b74db8c612f\") " pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:35.693378 kubelet[2112]: I1213 14:21:35.692266 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cfd4da52-b2fc-454d-a89b-b9dba229bf14-node-certs\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693646 kubelet[2112]: I1213 14:21:35.692305 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-log-dir\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.693646 kubelet[2112]: I1213 14:21:35.692451 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-flexvol-driver-host\") pod \"calico-node-6wjg2\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " pod="calico-system/calico-node-6wjg2" Dec 13 14:21:35.796364 kubelet[2112]: E1213 14:21:35.796319 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.796364 kubelet[2112]: W1213 14:21:35.796356 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.796364 kubelet[2112]: E1213 14:21:35.796386 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.801033 kubelet[2112]: E1213 14:21:35.800996 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.801033 kubelet[2112]: W1213 14:21:35.801029 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.801325 kubelet[2112]: E1213 14:21:35.801191 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.801451 kubelet[2112]: E1213 14:21:35.801424 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.801451 kubelet[2112]: W1213 14:21:35.801444 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.801613 kubelet[2112]: E1213 14:21:35.801587 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.801829 kubelet[2112]: E1213 14:21:35.801809 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.801829 kubelet[2112]: W1213 14:21:35.801829 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.802118 kubelet[2112]: E1213 14:21:35.801969 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.802209 kubelet[2112]: E1213 14:21:35.802178 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.802209 kubelet[2112]: W1213 14:21:35.802198 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.802359 kubelet[2112]: E1213 14:21:35.802221 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.802624 kubelet[2112]: E1213 14:21:35.802601 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.802624 kubelet[2112]: W1213 14:21:35.802618 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.802796 kubelet[2112]: E1213 14:21:35.802652 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.803001 kubelet[2112]: E1213 14:21:35.802979 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.803001 kubelet[2112]: W1213 14:21:35.802999 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.803240 kubelet[2112]: E1213 14:21:35.803023 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.803347 kubelet[2112]: E1213 14:21:35.803326 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.803347 kubelet[2112]: W1213 14:21:35.803346 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.803509 kubelet[2112]: E1213 14:21:35.803460 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.803760 kubelet[2112]: E1213 14:21:35.803730 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.803760 kubelet[2112]: W1213 14:21:35.803749 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.803989 kubelet[2112]: E1213 14:21:35.803770 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.804103 kubelet[2112]: E1213 14:21:35.804081 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.804103 kubelet[2112]: W1213 14:21:35.804097 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.804236 kubelet[2112]: E1213 14:21:35.804118 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.804531 kubelet[2112]: E1213 14:21:35.804511 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.804531 kubelet[2112]: W1213 14:21:35.804531 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.804700 kubelet[2112]: E1213 14:21:35.804554 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.805150 kubelet[2112]: E1213 14:21:35.805125 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.805150 kubelet[2112]: W1213 14:21:35.805147 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.805302 kubelet[2112]: E1213 14:21:35.805211 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.810085 kubelet[2112]: E1213 14:21:35.810055 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.810296 kubelet[2112]: W1213 14:21:35.810272 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.810473 kubelet[2112]: E1213 14:21:35.810452 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.824862 kubelet[2112]: E1213 14:21:35.824830 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.825139 kubelet[2112]: W1213 14:21:35.825110 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.825312 kubelet[2112]: E1213 14:21:35.825292 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.833509 kubelet[2112]: E1213 14:21:35.832045 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:35.833509 kubelet[2112]: W1213 14:21:35.832074 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:35.833509 kubelet[2112]: E1213 14:21:35.832101 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:35.838230 env[1228]: time="2024-12-13T14:21:35.838169739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wjg2,Uid:cfd4da52-b2fc-454d-a89b-b9dba229bf14,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:35.867097 env[1228]: time="2024-12-13T14:21:35.866577539Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:35.867097 env[1228]: time="2024-12-13T14:21:35.866637034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:35.867097 env[1228]: time="2024-12-13T14:21:35.866668440Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:35.867097 env[1228]: time="2024-12-13T14:21:35.866852926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38 pid=2565 runtime=io.containerd.runc.v2 Dec 13 14:21:35.894658 systemd[1]: Started cri-containerd-398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38.scope. Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit: BPF prog-id=125 op=LOAD Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2565 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386331326637353739396364636135326536656263393131353334 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2565 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386331326637353739396364636135326536656263393131353334 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.923000 audit: BPF prog-id=126 op=LOAD Dec 13 14:21:35.923000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028d950 items=0 ppid=2565 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386331326637353739396364636135326536656263393131353334 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit: BPF prog-id=127 op=LOAD Dec 13 14:21:35.924000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028d998 items=0 ppid=2565 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386331326637353739396364636135326536656263393131353334 Dec 13 14:21:35.924000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:21:35.924000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { perfmon } for pid=2574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit[2574]: AVC avc: denied { bpf } for pid=2574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:35.924000 audit: BPF prog-id=128 op=LOAD Dec 13 14:21:35.924000 audit[2574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028dda8 items=0 ppid=2565 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:35.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386331326637353739396364636135326536656263393131353334 Dec 13 14:21:35.955952 env[1228]: time="2024-12-13T14:21:35.955779702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wjg2,Uid:cfd4da52-b2fc-454d-a89b-b9dba229bf14,Namespace:calico-system,Attempt:0,} returns sandbox id \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\"" Dec 13 14:21:36.423000 audit[2599]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:36.423000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc7b3c0890 a2=0 a3=7ffc7b3c087c items=0 ppid=2316 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:36.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:36.428000 audit[2599]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:36.428000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc7b3c0890 a2=0 a3=0 items=0 ppid=2316 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:36.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:36.666593 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3190628732.mount: Deactivated successfully. Dec 13 14:21:37.565681 kubelet[2112]: E1213 14:21:37.565628 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:37.838936 env[1228]: time="2024-12-13T14:21:37.838765903Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:37.841996 env[1228]: time="2024-12-13T14:21:37.841947402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:37.844535 env[1228]: time="2024-12-13T14:21:37.844487918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:37.847039 env[1228]: time="2024-12-13T14:21:37.846955793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:37.847803 env[1228]: time="2024-12-13T14:21:37.847744893Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:21:37.866139 env[1228]: time="2024-12-13T14:21:37.862233839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:21:37.877362 env[1228]: time="2024-12-13T14:21:37.877175188Z" level=info msg="CreateContainer within sandbox \"00829536ebd700223b094ba740714aa32bd10779d55d24ecf3b4bfc4186f4a98\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:21:37.908351 env[1228]: time="2024-12-13T14:21:37.908276557Z" level=info msg="CreateContainer within sandbox \"00829536ebd700223b094ba740714aa32bd10779d55d24ecf3b4bfc4186f4a98\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c03b77b780ba57ba3433beec1b6ea7d8af891a73d7184e3d1ced6422ec9c76b2\"" Dec 13 14:21:37.911287 env[1228]: time="2024-12-13T14:21:37.911237906Z" level=info msg="StartContainer for \"c03b77b780ba57ba3433beec1b6ea7d8af891a73d7184e3d1ced6422ec9c76b2\"" Dec 13 14:21:37.950250 systemd[1]: Started cri-containerd-c03b77b780ba57ba3433beec1b6ea7d8af891a73d7184e3d1ced6422ec9c76b2.scope. Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.978000 audit: BPF prog-id=129 op=LOAD Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2508 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:37.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336237376237383062613537626133343333626565633162366561 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2508 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:37.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336237376237383062613537626133343333626565633162366561 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit: BPF prog-id=130 op=LOAD Dec 13 14:21:37.979000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d4b60 items=0 ppid=2508 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:37.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336237376237383062613537626133343333626565633162366561 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit: BPF prog-id=131 op=LOAD Dec 13 14:21:37.979000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d4ba8 items=0 ppid=2508 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:37.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336237376237383062613537626133343333626565633162366561 Dec 13 14:21:37.979000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:21:37.979000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:37.979000 audit: BPF prog-id=132 op=LOAD Dec 13 14:21:37.979000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4fb8 items=0 ppid=2508 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:37.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330336237376237383062613537626133343333626565633162366561 Dec 13 14:21:38.026307 env[1228]: time="2024-12-13T14:21:38.026178250Z" level=info msg="StartContainer for \"c03b77b780ba57ba3433beec1b6ea7d8af891a73d7184e3d1ced6422ec9c76b2\" returns successfully" Dec 13 14:21:38.710178 kubelet[2112]: I1213 14:21:38.710047 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8649d69555-cncrn" podStartSLOduration=1.547656854 podStartE2EDuration="3.710022255s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:21:35.686993537 +0000 UTC m=+23.274046984" lastFinishedPulling="2024-12-13 14:21:37.849358945 +0000 UTC m=+25.436412385" observedRunningTime="2024-12-13 14:21:38.707434163 +0000 UTC m=+26.294487631" watchObservedRunningTime="2024-12-13 14:21:38.710022255 +0000 UTC m=+26.297075723" Dec 13 14:21:38.713006 kubelet[2112]: E1213 14:21:38.712938 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.713006 kubelet[2112]: W1213 14:21:38.713002 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.713266 kubelet[2112]: E1213 14:21:38.713056 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.713568 kubelet[2112]: E1213 14:21:38.713542 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.713568 kubelet[2112]: W1213 14:21:38.713562 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.713760 kubelet[2112]: E1213 14:21:38.713582 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.713963 kubelet[2112]: E1213 14:21:38.713943 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.714071 kubelet[2112]: W1213 14:21:38.713961 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.714071 kubelet[2112]: E1213 14:21:38.713994 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.714347 kubelet[2112]: E1213 14:21:38.714310 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.714347 kubelet[2112]: W1213 14:21:38.714330 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.714606 kubelet[2112]: E1213 14:21:38.714348 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.714695 kubelet[2112]: E1213 14:21:38.714666 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.714695 kubelet[2112]: W1213 14:21:38.714691 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.714847 kubelet[2112]: E1213 14:21:38.714709 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.715035 kubelet[2112]: E1213 14:21:38.715007 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.715035 kubelet[2112]: W1213 14:21:38.715028 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.715279 kubelet[2112]: E1213 14:21:38.715044 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.715364 kubelet[2112]: E1213 14:21:38.715330 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.715364 kubelet[2112]: W1213 14:21:38.715342 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.715364 kubelet[2112]: E1213 14:21:38.715358 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.715658 kubelet[2112]: E1213 14:21:38.715629 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.715658 kubelet[2112]: W1213 14:21:38.715650 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.715826 kubelet[2112]: E1213 14:21:38.715666 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.716030 kubelet[2112]: E1213 14:21:38.715989 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.716030 kubelet[2112]: W1213 14:21:38.716009 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.716030 kubelet[2112]: E1213 14:21:38.716026 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.716478 kubelet[2112]: E1213 14:21:38.716441 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.716478 kubelet[2112]: W1213 14:21:38.716465 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.716655 kubelet[2112]: E1213 14:21:38.716483 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.716770 kubelet[2112]: E1213 14:21:38.716749 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.716770 kubelet[2112]: W1213 14:21:38.716770 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.716922 kubelet[2112]: E1213 14:21:38.716787 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.717100 kubelet[2112]: E1213 14:21:38.717078 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.717100 kubelet[2112]: W1213 14:21:38.717098 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.717269 kubelet[2112]: E1213 14:21:38.717115 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.717502 kubelet[2112]: E1213 14:21:38.717476 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.717502 kubelet[2112]: W1213 14:21:38.717499 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.717662 kubelet[2112]: E1213 14:21:38.717517 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.717818 kubelet[2112]: E1213 14:21:38.717795 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.717818 kubelet[2112]: W1213 14:21:38.717817 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.718059 kubelet[2112]: E1213 14:21:38.717834 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.718555 kubelet[2112]: E1213 14:21:38.718498 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.718555 kubelet[2112]: W1213 14:21:38.718517 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.718555 kubelet[2112]: E1213 14:21:38.718551 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.719027 kubelet[2112]: E1213 14:21:38.719007 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.719027 kubelet[2112]: W1213 14:21:38.719023 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.719263 kubelet[2112]: E1213 14:21:38.719041 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.719548 kubelet[2112]: E1213 14:21:38.719525 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.719548 kubelet[2112]: W1213 14:21:38.719546 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.719815 kubelet[2112]: E1213 14:21:38.719564 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.720105 kubelet[2112]: E1213 14:21:38.720062 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.720275 kubelet[2112]: W1213 14:21:38.720252 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.720432 kubelet[2112]: E1213 14:21:38.720396 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.720784 kubelet[2112]: E1213 14:21:38.720764 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.720784 kubelet[2112]: W1213 14:21:38.720783 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.720958 kubelet[2112]: E1213 14:21:38.720805 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.721183 kubelet[2112]: E1213 14:21:38.721162 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.721183 kubelet[2112]: W1213 14:21:38.721180 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.721436 kubelet[2112]: E1213 14:21:38.721413 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.721583 kubelet[2112]: E1213 14:21:38.721497 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.721734 kubelet[2112]: W1213 14:21:38.721695 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.721857 kubelet[2112]: E1213 14:21:38.721834 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.722109 kubelet[2112]: E1213 14:21:38.722088 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.722109 kubelet[2112]: W1213 14:21:38.722105 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.722363 kubelet[2112]: E1213 14:21:38.722337 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.723373 kubelet[2112]: E1213 14:21:38.723341 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.723666 kubelet[2112]: W1213 14:21:38.723645 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.723831 kubelet[2112]: E1213 14:21:38.723811 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.724252 kubelet[2112]: E1213 14:21:38.724230 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.724252 kubelet[2112]: W1213 14:21:38.724249 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.724438 kubelet[2112]: E1213 14:21:38.724272 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.724629 kubelet[2112]: E1213 14:21:38.724608 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.724629 kubelet[2112]: W1213 14:21:38.724626 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.724778 kubelet[2112]: E1213 14:21:38.724743 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.725068 kubelet[2112]: E1213 14:21:38.725048 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.725068 kubelet[2112]: W1213 14:21:38.725065 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.725248 kubelet[2112]: E1213 14:21:38.725184 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.725425 kubelet[2112]: E1213 14:21:38.725404 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.725425 kubelet[2112]: W1213 14:21:38.725421 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.725575 kubelet[2112]: E1213 14:21:38.725560 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.726059 kubelet[2112]: E1213 14:21:38.726036 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.726059 kubelet[2112]: W1213 14:21:38.726055 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.726250 kubelet[2112]: E1213 14:21:38.726079 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.726657 kubelet[2112]: E1213 14:21:38.726633 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.726657 kubelet[2112]: W1213 14:21:38.726652 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.726937 kubelet[2112]: E1213 14:21:38.726675 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.727164 kubelet[2112]: E1213 14:21:38.727143 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.727164 kubelet[2112]: W1213 14:21:38.727162 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.727388 kubelet[2112]: E1213 14:21:38.727367 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.727624 kubelet[2112]: E1213 14:21:38.727428 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.727721 kubelet[2112]: W1213 14:21:38.727626 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.728088 kubelet[2112]: E1213 14:21:38.728063 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.728088 kubelet[2112]: W1213 14:21:38.728085 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.728338 kubelet[2112]: E1213 14:21:38.728103 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.728338 kubelet[2112]: E1213 14:21:38.728136 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:38.728926 kubelet[2112]: E1213 14:21:38.728875 2112 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:21:38.729075 kubelet[2112]: W1213 14:21:38.729049 2112 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:21:38.729179 kubelet[2112]: E1213 14:21:38.729079 2112 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:21:39.049670 env[1228]: time="2024-12-13T14:21:39.044507608Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:39.052963 env[1228]: time="2024-12-13T14:21:39.052918844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:39.055934 env[1228]: time="2024-12-13T14:21:39.055871756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:39.058112 env[1228]: time="2024-12-13T14:21:39.058052859Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:39.059083 env[1228]: time="2024-12-13T14:21:39.059035834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:21:39.063073 env[1228]: time="2024-12-13T14:21:39.063028335Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:21:39.090810 env[1228]: time="2024-12-13T14:21:39.090305108Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\"" Dec 13 14:21:39.091290 env[1228]: time="2024-12-13T14:21:39.091249273Z" level=info msg="StartContainer for \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\"" Dec 13 14:21:39.129849 systemd[1]: Started cri-containerd-46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726.scope. Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f09a41c4d48 items=0 ppid=2565 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:39.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436626634356663326562646361343761666230343037626163653732 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit: BPF prog-id=133 op=LOAD Dec 13 14:21:39.156000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4f88 items=0 ppid=2565 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:39.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436626634356663326562646361343761666230343037626163653732 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit: BPF prog-id=134 op=LOAD Dec 13 14:21:39.156000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4fd8 items=0 ppid=2565 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:39.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436626634356663326562646361343761666230343037626163653732 Dec 13 14:21:39.156000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:21:39.156000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:39.156000 audit: BPF prog-id=135 op=LOAD Dec 13 14:21:39.156000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5068 items=0 ppid=2565 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:39.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436626634356663326562646361343761666230343037626163653732 Dec 13 14:21:39.185159 env[1228]: time="2024-12-13T14:21:39.185090309Z" level=info msg="StartContainer for \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\" returns successfully" Dec 13 14:21:39.206913 systemd[1]: cri-containerd-46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726.scope: Deactivated successfully. Dec 13 14:21:39.209000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:21:39.242347 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726-rootfs.mount: Deactivated successfully. Dec 13 14:21:39.566948 kubelet[2112]: E1213 14:21:39.566835 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:39.698521 kubelet[2112]: I1213 14:21:39.698488 2112 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:21:39.834397 env[1228]: time="2024-12-13T14:21:39.834202844Z" level=info msg="shim disconnected" id=46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726 Dec 13 14:21:39.834397 env[1228]: time="2024-12-13T14:21:39.834291043Z" level=warning msg="cleaning up after shim disconnected" id=46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726 namespace=k8s.io Dec 13 14:21:39.834397 env[1228]: time="2024-12-13T14:21:39.834307565Z" level=info msg="cleaning up dead shim" Dec 13 14:21:39.848568 env[1228]: time="2024-12-13T14:21:39.848488483Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2722 runtime=io.containerd.runc.v2\n" Dec 13 14:21:40.706944 env[1228]: time="2024-12-13T14:21:40.705480654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:21:41.565837 kubelet[2112]: E1213 14:21:41.565757 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:43.565678 kubelet[2112]: E1213 14:21:43.565613 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:45.217529 kubelet[2112]: I1213 14:21:45.217478 2112 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:21:45.318407 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 14:21:45.318607 kernel: audit: type=1325 audit(1734099705.295:992): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:45.295000 audit[2736]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:45.352840 kernel: audit: type=1300 audit(1734099705.295:992): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc7ce64b00 a2=0 a3=7ffc7ce64aec items=0 ppid=2316 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.295000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc7ce64b00 a2=0 a3=7ffc7ce64aec items=0 ppid=2316 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:45.384862 kernel: audit: type=1327 audit(1734099705.295:992): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:45.385036 kernel: audit: type=1325 audit(1734099705.352:993): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:45.352000 audit[2736]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:45.352000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc7ce64b00 a2=0 a3=7ffc7ce64aec items=0 ppid=2316 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:45.433989 kernel: audit: type=1300 audit(1734099705.352:993): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc7ce64b00 a2=0 a3=7ffc7ce64aec items=0 ppid=2316 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.434131 kernel: audit: type=1327 audit(1734099705.352:993): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:45.571216 kubelet[2112]: E1213 14:21:45.565985 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:45.605353 env[1228]: time="2024-12-13T14:21:45.605291247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:45.608957 env[1228]: time="2024-12-13T14:21:45.608901348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:45.612223 env[1228]: time="2024-12-13T14:21:45.612174174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:45.614402 env[1228]: time="2024-12-13T14:21:45.614351554Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:45.615095 env[1228]: time="2024-12-13T14:21:45.615043849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:21:45.619155 env[1228]: time="2024-12-13T14:21:45.618819757Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:21:45.642391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount125329548.mount: Deactivated successfully. Dec 13 14:21:45.653911 env[1228]: time="2024-12-13T14:21:45.653816001Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\"" Dec 13 14:21:45.655017 env[1228]: time="2024-12-13T14:21:45.654975672Z" level=info msg="StartContainer for \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\"" Dec 13 14:21:45.688348 systemd[1]: Started cri-containerd-5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944.scope. Dec 13 14:21:45.699545 systemd[1]: run-containerd-runc-k8s.io-5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944-runc.CNQXUr.mount: Deactivated successfully. Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fce0c00d0a8 items=0 ppid=2565 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.785627 kernel: audit: type=1400 audit(1734099705.729:994): avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.785792 kernel: audit: type=1300 audit(1734099705.729:994): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fce0c00d0a8 items=0 ppid=2565 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.785840 kernel: audit: type=1327 audit(1734099705.729:994): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563373739313463663430613030393534336463376562613632353062 Dec 13 14:21:45.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563373739313463663430613030393534336463376562613632353062 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.835947 kernel: audit: type=1400 audit(1734099705.729:995): avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.729000 audit: BPF prog-id=136 op=LOAD Dec 13 14:21:45.729000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000380598 items=0 ppid=2565 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563373739313463663430613030393534336463376562613632353062 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit: BPF prog-id=137 op=LOAD Dec 13 14:21:45.812000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220a08 items=0 ppid=2565 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563373739313463663430613030393534336463376562613632353062 Dec 13 14:21:45.812000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:21:45.812000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:45.812000 audit: BPF prog-id=138 op=LOAD Dec 13 14:21:45.812000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220a98 items=0 ppid=2565 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:45.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563373739313463663430613030393534336463376562613632353062 Dec 13 14:21:45.858113 env[1228]: time="2024-12-13T14:21:45.858049464Z" level=info msg="StartContainer for \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\" returns successfully" Dec 13 14:21:46.784768 env[1228]: time="2024-12-13T14:21:46.784676825Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:21:46.787975 systemd[1]: cri-containerd-5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944.scope: Deactivated successfully. Dec 13 14:21:46.790000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:21:46.824534 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944-rootfs.mount: Deactivated successfully. Dec 13 14:21:46.860480 kubelet[2112]: I1213 14:21:46.859380 2112 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:21:46.893434 kubelet[2112]: I1213 14:21:46.892742 2112 topology_manager.go:215] "Topology Admit Handler" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" podNamespace="calico-apiserver" podName="calico-apiserver-75bc9dcd5f-md22j" Dec 13 14:21:46.893434 kubelet[2112]: I1213 14:21:46.893043 2112 topology_manager.go:215] "Topology Admit Handler" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" podNamespace="kube-system" podName="coredns-7db6d8ff4d-pdjqf" Dec 13 14:21:46.908286 systemd[1]: Created slice kubepods-burstable-podd45d4b8c_22c2_416b_b434_328c539f2fe5.slice. Dec 13 14:21:46.919093 kubelet[2112]: I1213 14:21:46.918923 2112 topology_manager.go:215] "Topology Admit Handler" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" podNamespace="calico-apiserver" podName="calico-apiserver-75bc9dcd5f-zskrp" Dec 13 14:21:46.919294 kubelet[2112]: I1213 14:21:46.919174 2112 topology_manager.go:215] "Topology Admit Handler" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" podNamespace="kube-system" podName="coredns-7db6d8ff4d-wmkdc" Dec 13 14:21:46.919472 kubelet[2112]: I1213 14:21:46.919368 2112 topology_manager.go:215] "Topology Admit Handler" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" podNamespace="calico-system" podName="calico-kube-controllers-5bd4dcdc94-f8666" Dec 13 14:21:46.931314 systemd[1]: Created slice kubepods-besteffort-pod61cc0cc6_461a_431a_bfe1_2c1336d14ad2.slice. Dec 13 14:21:46.944261 systemd[1]: Created slice kubepods-besteffort-pod88c47553_e788_4fd3_b77f_bd1733a29b49.slice. Dec 13 14:21:46.954413 systemd[1]: Created slice kubepods-besteffort-podcee06149_4d07_4e52_aec3_9ed8f8ffeb91.slice. Dec 13 14:21:46.967669 systemd[1]: Created slice kubepods-burstable-podd5b37a5c_716e_4b9d_b163_b61e3e97284c.slice. Dec 13 14:21:46.992814 kubelet[2112]: I1213 14:21:46.992763 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d45d4b8c-22c2-416b-b434-328c539f2fe5-config-volume\") pod \"coredns-7db6d8ff4d-pdjqf\" (UID: \"d45d4b8c-22c2-416b-b434-328c539f2fe5\") " pod="kube-system/coredns-7db6d8ff4d-pdjqf" Dec 13 14:21:46.993202 kubelet[2112]: I1213 14:21:46.993152 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cx55\" (UniqueName: \"kubernetes.io/projected/61cc0cc6-461a-431a-bfe1-2c1336d14ad2-kube-api-access-5cx55\") pod \"calico-apiserver-75bc9dcd5f-md22j\" (UID: \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\") " pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" Dec 13 14:21:46.993424 kubelet[2112]: I1213 14:21:46.993386 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lx259\" (UniqueName: \"kubernetes.io/projected/d45d4b8c-22c2-416b-b434-328c539f2fe5-kube-api-access-lx259\") pod \"coredns-7db6d8ff4d-pdjqf\" (UID: \"d45d4b8c-22c2-416b-b434-328c539f2fe5\") " pod="kube-system/coredns-7db6d8ff4d-pdjqf" Dec 13 14:21:46.993715 kubelet[2112]: I1213 14:21:46.993669 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/61cc0cc6-461a-431a-bfe1-2c1336d14ad2-calico-apiserver-certs\") pod \"calico-apiserver-75bc9dcd5f-md22j\" (UID: \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\") " pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" Dec 13 14:21:47.095121 kubelet[2112]: I1213 14:21:47.094951 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/88c47553-e788-4fd3-b77f-bd1733a29b49-calico-apiserver-certs\") pod \"calico-apiserver-75bc9dcd5f-zskrp\" (UID: \"88c47553-e788-4fd3-b77f-bd1733a29b49\") " pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" Dec 13 14:21:47.095121 kubelet[2112]: I1213 14:21:47.095022 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f5w6b\" (UniqueName: \"kubernetes.io/projected/d5b37a5c-716e-4b9d-b163-b61e3e97284c-kube-api-access-f5w6b\") pod \"coredns-7db6d8ff4d-wmkdc\" (UID: \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\") " pod="kube-system/coredns-7db6d8ff4d-wmkdc" Dec 13 14:21:47.095121 kubelet[2112]: I1213 14:21:47.095051 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zlhrg\" (UniqueName: \"kubernetes.io/projected/cee06149-4d07-4e52-aec3-9ed8f8ffeb91-kube-api-access-zlhrg\") pod \"calico-kube-controllers-5bd4dcdc94-f8666\" (UID: \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\") " pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" Dec 13 14:21:47.095121 kubelet[2112]: I1213 14:21:47.095085 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cee06149-4d07-4e52-aec3-9ed8f8ffeb91-tigera-ca-bundle\") pod \"calico-kube-controllers-5bd4dcdc94-f8666\" (UID: \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\") " pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" Dec 13 14:21:47.095666 kubelet[2112]: I1213 14:21:47.095130 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d5b37a5c-716e-4b9d-b163-b61e3e97284c-config-volume\") pod \"coredns-7db6d8ff4d-wmkdc\" (UID: \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\") " pod="kube-system/coredns-7db6d8ff4d-wmkdc" Dec 13 14:21:47.095666 kubelet[2112]: I1213 14:21:47.095175 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cm8q7\" (UniqueName: \"kubernetes.io/projected/88c47553-e788-4fd3-b77f-bd1733a29b49-kube-api-access-cm8q7\") pod \"calico-apiserver-75bc9dcd5f-zskrp\" (UID: \"88c47553-e788-4fd3-b77f-bd1733a29b49\") " pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" Dec 13 14:21:47.228816 env[1228]: time="2024-12-13T14:21:47.228331778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdjqf,Uid:d45d4b8c-22c2-416b-b434-328c539f2fe5,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:47.241218 env[1228]: time="2024-12-13T14:21:47.241158762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-md22j,Uid:61cc0cc6-461a-431a-bfe1-2c1336d14ad2,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:21:47.256283 env[1228]: time="2024-12-13T14:21:47.256225958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-zskrp,Uid:88c47553-e788-4fd3-b77f-bd1733a29b49,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:21:47.260299 env[1228]: time="2024-12-13T14:21:47.260219812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd4dcdc94-f8666,Uid:cee06149-4d07-4e52-aec3-9ed8f8ffeb91,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:47.274829 env[1228]: time="2024-12-13T14:21:47.274753844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wmkdc,Uid:d5b37a5c-716e-4b9d-b163-b61e3e97284c,Namespace:kube-system,Attempt:0,}" Dec 13 14:21:47.573588 systemd[1]: Created slice kubepods-besteffort-pode7222121_f624_4f42_98c6_6b74db8c612f.slice. Dec 13 14:21:47.578114 env[1228]: time="2024-12-13T14:21:47.578049354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mc7jg,Uid:e7222121-f624-4f42-98c6-6b74db8c612f,Namespace:calico-system,Attempt:0,}" Dec 13 14:21:47.601454 env[1228]: time="2024-12-13T14:21:47.601391469Z" level=info msg="shim disconnected" id=5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944 Dec 13 14:21:47.601738 env[1228]: time="2024-12-13T14:21:47.601698093Z" level=warning msg="cleaning up after shim disconnected" id=5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944 namespace=k8s.io Dec 13 14:21:47.601738 env[1228]: time="2024-12-13T14:21:47.601732859Z" level=info msg="cleaning up dead shim" Dec 13 14:21:47.615363 env[1228]: time="2024-12-13T14:21:47.615301902Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2795 runtime=io.containerd.runc.v2\n" Dec 13 14:21:47.748684 env[1228]: time="2024-12-13T14:21:47.748622890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:21:47.972958 env[1228]: time="2024-12-13T14:21:47.972814897Z" level=error msg="Failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:47.977066 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295-shm.mount: Deactivated successfully. Dec 13 14:21:47.979076 env[1228]: time="2024-12-13T14:21:47.979004452Z" level=error msg="encountered an error cleaning up failed sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:47.979247 env[1228]: time="2024-12-13T14:21:47.979108685Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdjqf,Uid:d45d4b8c-22c2-416b-b434-328c539f2fe5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:47.979531 kubelet[2112]: E1213 14:21:47.979477 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:47.981796 kubelet[2112]: E1213 14:21:47.979563 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pdjqf" Dec 13 14:21:47.981796 kubelet[2112]: E1213 14:21:47.979599 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-pdjqf" Dec 13 14:21:47.981796 kubelet[2112]: E1213 14:21:47.979665 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-pdjqf_kube-system(d45d4b8c-22c2-416b-b434-328c539f2fe5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-pdjqf_kube-system(d45d4b8c-22c2-416b-b434-328c539f2fe5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" Dec 13 14:21:48.031157 env[1228]: time="2024-12-13T14:21:48.031062537Z" level=error msg="Failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.035144 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35-shm.mount: Deactivated successfully. Dec 13 14:21:48.036452 env[1228]: time="2024-12-13T14:21:48.036381629Z" level=error msg="encountered an error cleaning up failed sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.036715 env[1228]: time="2024-12-13T14:21:48.036664631Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-zskrp,Uid:88c47553-e788-4fd3-b77f-bd1733a29b49,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.037315 kubelet[2112]: E1213 14:21:48.037247 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.037451 kubelet[2112]: E1213 14:21:48.037348 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" Dec 13 14:21:48.037451 kubelet[2112]: E1213 14:21:48.037383 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" Dec 13 14:21:48.037584 kubelet[2112]: E1213 14:21:48.037450 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75bc9dcd5f-zskrp_calico-apiserver(88c47553-e788-4fd3-b77f-bd1733a29b49)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75bc9dcd5f-zskrp_calico-apiserver(88c47553-e788-4fd3-b77f-bd1733a29b49)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" Dec 13 14:21:48.050873 env[1228]: time="2024-12-13T14:21:48.050798171Z" level=error msg="Failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.054822 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a-shm.mount: Deactivated successfully. Dec 13 14:21:48.057076 env[1228]: time="2024-12-13T14:21:48.056996762Z" level=error msg="encountered an error cleaning up failed sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.057245 env[1228]: time="2024-12-13T14:21:48.057105721Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-md22j,Uid:61cc0cc6-461a-431a-bfe1-2c1336d14ad2,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.057447 kubelet[2112]: E1213 14:21:48.057397 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.057578 kubelet[2112]: E1213 14:21:48.057478 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" Dec 13 14:21:48.057578 kubelet[2112]: E1213 14:21:48.057515 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" Dec 13 14:21:48.057706 kubelet[2112]: E1213 14:21:48.057571 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75bc9dcd5f-md22j_calico-apiserver(61cc0cc6-461a-431a-bfe1-2c1336d14ad2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75bc9dcd5f-md22j_calico-apiserver(61cc0cc6-461a-431a-bfe1-2c1336d14ad2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" Dec 13 14:21:48.076578 env[1228]: time="2024-12-13T14:21:48.076477943Z" level=error msg="Failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.080956 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489-shm.mount: Deactivated successfully. Dec 13 14:21:48.081912 env[1228]: time="2024-12-13T14:21:48.081815218Z" level=error msg="encountered an error cleaning up failed sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.082363 env[1228]: time="2024-12-13T14:21:48.082294542Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wmkdc,Uid:d5b37a5c-716e-4b9d-b163-b61e3e97284c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.083355 kubelet[2112]: E1213 14:21:48.083227 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.083355 kubelet[2112]: E1213 14:21:48.083303 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-wmkdc" Dec 13 14:21:48.083355 kubelet[2112]: E1213 14:21:48.083350 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-wmkdc" Dec 13 14:21:48.083639 kubelet[2112]: E1213 14:21:48.083411 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-wmkdc_kube-system(d5b37a5c-716e-4b9d-b163-b61e3e97284c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-wmkdc_kube-system(d5b37a5c-716e-4b9d-b163-b61e3e97284c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" Dec 13 14:21:48.086367 env[1228]: time="2024-12-13T14:21:48.086311546Z" level=error msg="Failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.087312 env[1228]: time="2024-12-13T14:21:48.087255068Z" level=error msg="encountered an error cleaning up failed sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.087644 env[1228]: time="2024-12-13T14:21:48.087584637Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd4dcdc94-f8666,Uid:cee06149-4d07-4e52-aec3-9ed8f8ffeb91,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.089303 kubelet[2112]: E1213 14:21:48.088849 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.089303 kubelet[2112]: E1213 14:21:48.088934 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" Dec 13 14:21:48.089303 kubelet[2112]: E1213 14:21:48.088972 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" Dec 13 14:21:48.089540 kubelet[2112]: E1213 14:21:48.089040 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5bd4dcdc94-f8666_calico-system(cee06149-4d07-4e52-aec3-9ed8f8ffeb91)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5bd4dcdc94-f8666_calico-system(cee06149-4d07-4e52-aec3-9ed8f8ffeb91)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" Dec 13 14:21:48.117152 env[1228]: time="2024-12-13T14:21:48.117068456Z" level=error msg="Failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.117611 env[1228]: time="2024-12-13T14:21:48.117549232Z" level=error msg="encountered an error cleaning up failed sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.117726 env[1228]: time="2024-12-13T14:21:48.117626204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mc7jg,Uid:e7222121-f624-4f42-98c6-6b74db8c612f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.118055 kubelet[2112]: E1213 14:21:48.117990 2112 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.118204 kubelet[2112]: E1213 14:21:48.118059 2112 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:48.118204 kubelet[2112]: E1213 14:21:48.118088 2112 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mc7jg" Dec 13 14:21:48.118204 kubelet[2112]: E1213 14:21:48.118153 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mc7jg_calico-system(e7222121-f624-4f42-98c6-6b74db8c612f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mc7jg_calico-system(e7222121-f624-4f42-98c6-6b74db8c612f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:48.739481 kubelet[2112]: I1213 14:21:48.738654 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:21:48.739728 env[1228]: time="2024-12-13T14:21:48.739565441Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:21:48.743188 kubelet[2112]: I1213 14:21:48.743100 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:21:48.743875 env[1228]: time="2024-12-13T14:21:48.743831242Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:21:48.752062 kubelet[2112]: I1213 14:21:48.751848 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:21:48.754310 env[1228]: time="2024-12-13T14:21:48.754265530Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:21:48.754617 kubelet[2112]: I1213 14:21:48.754438 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:21:48.759536 env[1228]: time="2024-12-13T14:21:48.759432137Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:21:48.770787 kubelet[2112]: I1213 14:21:48.770736 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:21:48.776406 env[1228]: time="2024-12-13T14:21:48.776343178Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:21:48.783235 kubelet[2112]: I1213 14:21:48.782580 2112 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:21:48.797864 env[1228]: time="2024-12-13T14:21:48.797791406Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:21:48.825856 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b-shm.mount: Deactivated successfully. Dec 13 14:21:48.826040 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb-shm.mount: Deactivated successfully. Dec 13 14:21:48.865153 env[1228]: time="2024-12-13T14:21:48.865074668Z" level=error msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" failed" error="failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.866105 kubelet[2112]: E1213 14:21:48.865722 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:21:48.866105 kubelet[2112]: E1213 14:21:48.865852 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489"} Dec 13 14:21:48.866105 kubelet[2112]: E1213 14:21:48.866003 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.866105 kubelet[2112]: E1213 14:21:48.866060 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" Dec 13 14:21:48.914033 env[1228]: time="2024-12-13T14:21:48.913934773Z" level=error msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" failed" error="failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.914497 kubelet[2112]: E1213 14:21:48.914368 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:21:48.914726 kubelet[2112]: E1213 14:21:48.914516 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a"} Dec 13 14:21:48.914726 kubelet[2112]: E1213 14:21:48.914577 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.914726 kubelet[2112]: E1213 14:21:48.914612 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" Dec 13 14:21:48.960680 env[1228]: time="2024-12-13T14:21:48.960599545Z" level=error msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" failed" error="failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.961460 kubelet[2112]: E1213 14:21:48.961219 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:21:48.961460 kubelet[2112]: E1213 14:21:48.961289 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295"} Dec 13 14:21:48.961460 kubelet[2112]: E1213 14:21:48.961347 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.961460 kubelet[2112]: E1213 14:21:48.961393 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" Dec 13 14:21:48.963667 env[1228]: time="2024-12-13T14:21:48.963604298Z" level=error msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" failed" error="failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.964393 kubelet[2112]: E1213 14:21:48.964155 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:21:48.964393 kubelet[2112]: E1213 14:21:48.964226 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb"} Dec 13 14:21:48.964393 kubelet[2112]: E1213 14:21:48.964276 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.964393 kubelet[2112]: E1213 14:21:48.964310 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" Dec 13 14:21:48.965069 env[1228]: time="2024-12-13T14:21:48.964992072Z" level=error msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" failed" error="failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.965320 kubelet[2112]: E1213 14:21:48.965249 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:21:48.965320 kubelet[2112]: E1213 14:21:48.965297 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b"} Dec 13 14:21:48.966061 kubelet[2112]: E1213 14:21:48.965340 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.966061 kubelet[2112]: E1213 14:21:48.965378 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:21:48.980219 env[1228]: time="2024-12-13T14:21:48.980121146Z" level=error msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" failed" error="failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:21:48.980856 kubelet[2112]: E1213 14:21:48.980519 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:21:48.980856 kubelet[2112]: E1213 14:21:48.980588 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35"} Dec 13 14:21:48.980856 kubelet[2112]: E1213 14:21:48.980641 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:21:48.980856 kubelet[2112]: E1213 14:21:48.980682 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" Dec 13 14:21:55.521028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount995687648.mount: Deactivated successfully. Dec 13 14:21:55.559611 env[1228]: time="2024-12-13T14:21:55.559505825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:55.562573 env[1228]: time="2024-12-13T14:21:55.562510440Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:55.565097 env[1228]: time="2024-12-13T14:21:55.565032880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:55.567008 env[1228]: time="2024-12-13T14:21:55.566967324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:55.567687 env[1228]: time="2024-12-13T14:21:55.567644462Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:21:55.594201 env[1228]: time="2024-12-13T14:21:55.594144924Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:21:55.622146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3111268319.mount: Deactivated successfully. Dec 13 14:21:55.627164 env[1228]: time="2024-12-13T14:21:55.627114319Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\"" Dec 13 14:21:55.630059 env[1228]: time="2024-12-13T14:21:55.628163524Z" level=info msg="StartContainer for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\"" Dec 13 14:21:55.658113 systemd[1]: Started cri-containerd-5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f.scope. Dec 13 14:21:55.695694 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:21:55.695953 kernel: audit: type=1400 audit(1734099715.686:1001): avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.686000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.686000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6928edc0a8 items=0 ppid=2565 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:55.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373965663734613734333439393861646239393037663739613939 Dec 13 14:21:55.748934 kernel: audit: type=1300 audit(1734099715.686:1001): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6928edc0a8 items=0 ppid=2565 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:55.749017 kernel: audit: type=1327 audit(1734099715.686:1001): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373965663734613734333439393861646239393037663739613939 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.819863 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.820033 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.820083 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.883301 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.883492 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.884014 env[1228]: time="2024-12-13T14:21:55.883959882Z" level=info msg="StartContainer for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" returns successfully" Dec 13 14:21:55.904393 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.925860 kernel: audit: type=1400 audit(1734099715.692:1002): avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.692000 audit: BPF prog-id=139 op=LOAD Dec 13 14:21:55.692000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8788 items=0 ppid=2565 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:55.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373965663734613734333439393861646239393037663739613939 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit: BPF prog-id=140 op=LOAD Dec 13 14:21:55.714000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f87d8 items=0 ppid=2565 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:55.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373965663734613734333439393861646239393037663739613939 Dec 13 14:21:55.714000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:21:55.714000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:55.714000 audit: BPF prog-id=141 op=LOAD Dec 13 14:21:55.714000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8868 items=0 ppid=2565 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:55.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373965663734613734333439393861646239393037663739613939 Dec 13 14:21:55.989732 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:21:55.989925 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:21:56.018964 systemd[1]: cri-containerd-5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f.scope: Deactivated successfully. Dec 13 14:21:56.022000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:21:57.600637 env[1228]: time="2024-12-13T14:21:57.600386118Z" level=info msg="shim disconnected" id=5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f Dec 13 14:21:57.600637 env[1228]: time="2024-12-13T14:21:57.600448431Z" level=warning msg="cleaning up after shim disconnected" id=5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f namespace=k8s.io Dec 13 14:21:57.600637 env[1228]: time="2024-12-13T14:21:57.600464909Z" level=info msg="cleaning up dead shim" Dec 13 14:21:57.604016 env[1228]: time="2024-12-13T14:21:57.600502212Z" level=error msg="failed sending message on channel" error="write unix /run/containerd/s/bebb6e6f983f5fe66910da67b190aa56d932f2f596510dcadfce2ba75ad4ae49->@: write: broken pipe" Dec 13 14:21:57.604227 env[1228]: time="2024-12-13T14:21:57.604154324Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="failed to exec in container: failed to create exec \"70d026493bf717db430aba39df22307278749777f2ba3a6da834d35d85f55a30\": ttrpc: closed: unknown" Dec 13 14:21:57.604648 kubelet[2112]: E1213 14:21:57.604583 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to create exec \"70d026493bf717db430aba39df22307278749777f2ba3a6da834d35d85f55a30\": ttrpc: closed: unknown" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.607203 env[1228]: time="2024-12-13T14:21:57.607091336Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" Dec 13 14:21:57.607638 kubelet[2112]: E1213 14:21:57.607568 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.609626 env[1228]: time="2024-12-13T14:21:57.609563101Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" Dec 13 14:21:57.610068 kubelet[2112]: E1213 14:21:57.610023 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.615837 env[1228]: time="2024-12-13T14:21:57.615766008Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" Dec 13 14:21:57.616654 kubelet[2112]: E1213 14:21:57.616593 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.618690 env[1228]: time="2024-12-13T14:21:57.618609670Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" Dec 13 14:21:57.618931 kubelet[2112]: E1213 14:21:57.618851 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.620463 env[1228]: time="2024-12-13T14:21:57.620402358Z" level=error msg="ExecSync for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" Dec 13 14:21:57.621229 kubelet[2112]: E1213 14:21:57.620710 2112 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f not found: not found" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:21:57.621452 env[1228]: time="2024-12-13T14:21:57.621421386Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3182 runtime=io.containerd.runc.v2\n" Dec 13 14:21:57.813775 kubelet[2112]: I1213 14:21:57.813717 2112 scope.go:117] "RemoveContainer" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" Dec 13 14:21:57.818700 env[1228]: time="2024-12-13T14:21:57.818640770Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 14:21:57.848490 env[1228]: time="2024-12-13T14:21:57.848401871Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781\"" Dec 13 14:21:57.852695 env[1228]: time="2024-12-13T14:21:57.852562416Z" level=info msg="StartContainer for \"c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781\"" Dec 13 14:21:57.902914 systemd[1]: run-containerd-runc-k8s.io-c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781-runc.KWGCya.mount: Deactivated successfully. Dec 13 14:21:57.911054 systemd[1]: Started cri-containerd-c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781.scope. Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12609b9bd8 items=0 ppid=2565 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:57.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646266396463313934376333636565373761393062626533333334 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit: BPF prog-id=142 op=LOAD Dec 13 14:21:57.936000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a03b8 items=0 ppid=2565 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:57.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646266396463313934376333636565373761393062626533333334 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit: BPF prog-id=143 op=LOAD Dec 13 14:21:57.936000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0408 items=0 ppid=2565 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:57.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646266396463313934376333636565373761393062626533333334 Dec 13 14:21:57.936000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:21:57.936000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:57.936000 audit: BPF prog-id=144 op=LOAD Dec 13 14:21:57.936000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0498 items=0 ppid=2565 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:57.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646266396463313934376333636565373761393062626533333334 Dec 13 14:21:57.963425 env[1228]: time="2024-12-13T14:21:57.963354849Z" level=info msg="StartContainer for \"c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781\" returns successfully" Dec 13 14:21:58.045095 systemd[1]: cri-containerd-c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781.scope: Deactivated successfully. Dec 13 14:21:58.048000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:21:58.083016 env[1228]: time="2024-12-13T14:21:58.082945244Z" level=info msg="shim disconnected" id=c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781 Dec 13 14:21:58.083016 env[1228]: time="2024-12-13T14:21:58.083019053Z" level=warning msg="cleaning up after shim disconnected" id=c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781 namespace=k8s.io Dec 13 14:21:58.083419 env[1228]: time="2024-12-13T14:21:58.083034401Z" level=info msg="cleaning up dead shim" Dec 13 14:21:58.096003 env[1228]: time="2024-12-13T14:21:58.095935284Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:21:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3248 runtime=io.containerd.runc.v2\n" Dec 13 14:21:58.819398 kubelet[2112]: I1213 14:21:58.819290 2112 scope.go:117] "RemoveContainer" containerID="5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f" Dec 13 14:21:58.820042 kubelet[2112]: I1213 14:21:58.819822 2112 scope.go:117] "RemoveContainer" containerID="c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781" Dec 13 14:21:58.821195 kubelet[2112]: E1213 14:21:58.820950 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-6wjg2_calico-system(cfd4da52-b2fc-454d-a89b-b9dba229bf14)\"" pod="calico-system/calico-node-6wjg2" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" Dec 13 14:21:58.822789 env[1228]: time="2024-12-13T14:21:58.822735596Z" level=info msg="RemoveContainer for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\"" Dec 13 14:21:58.834507 env[1228]: time="2024-12-13T14:21:58.834418748Z" level=info msg="RemoveContainer for \"5979ef74a7434998adb9907f79a9933a8051fbff52881dbdb5c71fcd2a9a456f\" returns successfully" Dec 13 14:21:58.839859 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781-rootfs.mount: Deactivated successfully. Dec 13 14:21:59.826245 kubelet[2112]: I1213 14:21:59.826206 2112 scope.go:117] "RemoveContainer" containerID="c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781" Dec 13 14:21:59.827035 kubelet[2112]: E1213 14:21:59.826995 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-6wjg2_calico-system(cfd4da52-b2fc-454d-a89b-b9dba229bf14)\"" pod="calico-system/calico-node-6wjg2" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" Dec 13 14:22:02.574830 env[1228]: time="2024-12-13T14:22:02.574769985Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:22:02.576509 env[1228]: time="2024-12-13T14:22:02.574716465Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:22:02.577912 env[1228]: time="2024-12-13T14:22:02.575809296Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:22:02.649810 env[1228]: time="2024-12-13T14:22:02.649719171Z" level=error msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" failed" error="failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:02.650521 kubelet[2112]: E1213 14:22:02.650319 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:02.650521 kubelet[2112]: E1213 14:22:02.650387 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489"} Dec 13 14:22:02.650521 kubelet[2112]: E1213 14:22:02.650440 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:02.650521 kubelet[2112]: E1213 14:22:02.650477 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" Dec 13 14:22:02.664199 env[1228]: time="2024-12-13T14:22:02.664133202Z" level=error msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" failed" error="failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:02.664983 kubelet[2112]: E1213 14:22:02.664720 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:02.664983 kubelet[2112]: E1213 14:22:02.664796 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295"} Dec 13 14:22:02.664983 kubelet[2112]: E1213 14:22:02.664862 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:02.664983 kubelet[2112]: E1213 14:22:02.664926 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" Dec 13 14:22:02.671947 env[1228]: time="2024-12-13T14:22:02.671857566Z" level=error msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" failed" error="failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:02.672400 kubelet[2112]: E1213 14:22:02.672332 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:02.672546 kubelet[2112]: E1213 14:22:02.672397 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35"} Dec 13 14:22:02.672546 kubelet[2112]: E1213 14:22:02.672446 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:02.672546 kubelet[2112]: E1213 14:22:02.672487 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" Dec 13 14:22:03.566822 env[1228]: time="2024-12-13T14:22:03.566703772Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:22:03.603536 env[1228]: time="2024-12-13T14:22:03.603451286Z" level=error msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" failed" error="failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:03.604351 kubelet[2112]: E1213 14:22:03.604243 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:03.604510 kubelet[2112]: E1213 14:22:03.604372 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b"} Dec 13 14:22:03.604510 kubelet[2112]: E1213 14:22:03.604422 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:03.604510 kubelet[2112]: E1213 14:22:03.604457 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:22:04.568309 env[1228]: time="2024-12-13T14:22:04.568252973Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:22:04.568717 env[1228]: time="2024-12-13T14:22:04.568252976Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:22:04.622980 env[1228]: time="2024-12-13T14:22:04.622904943Z" level=error msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" failed" error="failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:04.624220 kubelet[2112]: E1213 14:22:04.623928 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:04.624220 kubelet[2112]: E1213 14:22:04.624017 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb"} Dec 13 14:22:04.624220 kubelet[2112]: E1213 14:22:04.624089 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:04.624220 kubelet[2112]: E1213 14:22:04.624128 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" Dec 13 14:22:04.628324 env[1228]: time="2024-12-13T14:22:04.628260374Z" level=error msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" failed" error="failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:04.628712 kubelet[2112]: E1213 14:22:04.628636 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:04.628838 kubelet[2112]: E1213 14:22:04.628714 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a"} Dec 13 14:22:04.628838 kubelet[2112]: E1213 14:22:04.628762 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:04.628838 kubelet[2112]: E1213 14:22:04.628797 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" Dec 13 14:22:07.867029 kubelet[2112]: I1213 14:22:07.866981 2112 scope.go:117] "RemoveContainer" containerID="c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781" Dec 13 14:22:07.867843 kubelet[2112]: E1213 14:22:07.867797 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-6wjg2_calico-system(cfd4da52-b2fc-454d-a89b-b9dba229bf14)\"" pod="calico-system/calico-node-6wjg2" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" Dec 13 14:22:08.843743 systemd[1]: Started sshd@7-10.128.0.72:22-139.178.68.195:49830.service. Dec 13 14:22:08.863827 kernel: kauditd_printk_skb: 78 callbacks suppressed Dec 13 14:22:08.864415 kernel: audit: type=1130 audit(1734099728.843:1015): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.72:22-139.178.68.195:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:08.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.72:22-139.178.68.195:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:09.142000 audit[3387]: USER_ACCT pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.174424 kernel: audit: type=1101 audit(1734099729.142:1016): pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.174575 kernel: audit: type=1103 audit(1734099729.172:1017): pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.172000 audit[3387]: CRED_ACQ pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.174736 sshd[3387]: Accepted publickey for core from 139.178.68.195 port 49830 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:09.174158 sshd[3387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:09.183913 systemd[1]: Started session-8.scope. Dec 13 14:22:09.185417 systemd-logind[1240]: New session 8 of user core. Dec 13 14:22:09.200925 kernel: audit: type=1006 audit(1734099729.172:1018): pid=3387 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 14:22:09.172000 audit[3387]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5a62aa0 a2=3 a3=0 items=0 ppid=1 pid=3387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:09.245257 kernel: audit: type=1300 audit(1734099729.172:1018): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef5a62aa0 a2=3 a3=0 items=0 ppid=1 pid=3387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:09.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:09.254909 kernel: audit: type=1327 audit(1734099729.172:1018): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:09.255070 kernel: audit: type=1105 audit(1734099729.193:1019): pid=3387 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.193000 audit[3387]: USER_START pid=3387 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.198000 audit[3389]: CRED_ACQ pid=3389 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.311609 kernel: audit: type=1103 audit(1734099729.198:1020): pid=3389 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.311803 kernel: audit: type=1400 audit(1734099729.205:1021): avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.205000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.205000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00771eea0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.205000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.205000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00839e5d0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.205000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.372962 kernel: audit: type=1300 audit(1734099729.205:1021): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00771eea0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.205000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00835aab0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.242000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.242000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00835ac60 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.272000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.272000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00835ad50 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.272000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.273000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:09.273000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00771eec0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:22:09.273000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:22:09.527301 sshd[3387]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:09.528000 audit[3387]: USER_END pid=3387 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.530000 audit[3387]: CRED_DISP pid=3387 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:09.535205 systemd[1]: sshd@7-10.128.0.72:22-139.178.68.195:49830.service: Deactivated successfully. Dec 13 14:22:09.536457 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:22:09.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.72:22-139.178.68.195:49830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:09.537126 systemd-logind[1240]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:22:09.539041 systemd-logind[1240]: Removed session 8. Dec 13 14:22:10.107000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:10.107000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:10.107000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001dcc570 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:10.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:10.107000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019507e0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:10.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:13.568916 env[1228]: time="2024-12-13T14:22:13.566551420Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:22:13.604298 env[1228]: time="2024-12-13T14:22:13.604218167Z" level=error msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" failed" error="failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:13.604521 kubelet[2112]: E1213 14:22:13.604475 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:13.605072 kubelet[2112]: E1213 14:22:13.604540 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489"} Dec 13 14:22:13.605072 kubelet[2112]: E1213 14:22:13.604588 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:13.605072 kubelet[2112]: E1213 14:22:13.604689 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" Dec 13 14:22:14.567478 env[1228]: time="2024-12-13T14:22:14.567418117Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:22:14.597041 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:22:14.597277 kernel: audit: type=1130 audit(1734099734.576:1032): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.72:22-139.178.68.195:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:14.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.72:22-139.178.68.195:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:14.577126 systemd[1]: Started sshd@8-10.128.0.72:22-139.178.68.195:49840.service. Dec 13 14:22:14.630689 env[1228]: time="2024-12-13T14:22:14.630603319Z" level=error msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" failed" error="failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:14.631263 kubelet[2112]: E1213 14:22:14.630943 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:14.631263 kubelet[2112]: E1213 14:22:14.631013 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35"} Dec 13 14:22:14.631263 kubelet[2112]: E1213 14:22:14.631073 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:14.631263 kubelet[2112]: E1213 14:22:14.631109 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" Dec 13 14:22:14.897000 audit[3426]: USER_ACCT pid=3426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:14.930286 kernel: audit: type=1101 audit(1734099734.897:1033): pid=3426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:14.930408 sshd[3426]: Accepted publickey for core from 139.178.68.195 port 49840 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:14.929480 sshd[3426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:14.927000 audit[3426]: CRED_ACQ pid=3426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:14.941529 systemd[1]: Started session-9.scope. Dec 13 14:22:14.942956 systemd-logind[1240]: New session 9 of user core. Dec 13 14:22:14.958486 kernel: audit: type=1103 audit(1734099734.927:1034): pid=3426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:14.958613 kernel: audit: type=1006 audit(1734099734.927:1035): pid=3426 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:22:14.927000 audit[3426]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85253460 a2=3 a3=0 items=0 ppid=1 pid=3426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.974921 kernel: audit: type=1300 audit(1734099734.927:1035): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85253460 a2=3 a3=0 items=0 ppid=1 pid=3426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:14.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:15.002991 kernel: audit: type=1327 audit(1734099734.927:1035): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:14.956000 audit[3426]: USER_START pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.012934 kernel: audit: type=1105 audit(1734099734.956:1036): pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:14.960000 audit[3443]: CRED_ACQ pid=3443 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.046034 kernel: audit: type=1103 audit(1734099734.960:1037): pid=3443 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.207704 sshd[3426]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:15.209000 audit[3426]: USER_END pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.213784 systemd[1]: sshd@8-10.128.0.72:22-139.178.68.195:49840.service: Deactivated successfully. Dec 13 14:22:15.215615 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:22:15.218441 systemd-logind[1240]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:22:15.219957 systemd-logind[1240]: Removed session 9. Dec 13 14:22:15.210000 audit[3426]: CRED_DISP pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.244108 kernel: audit: type=1106 audit(1734099735.209:1038): pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.244234 kernel: audit: type=1104 audit(1734099735.210:1039): pid=3426 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:15.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.72:22-139.178.68.195:49840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:15.567399 env[1228]: time="2024-12-13T14:22:15.567244057Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:22:15.601965 env[1228]: time="2024-12-13T14:22:15.601860613Z" level=error msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" failed" error="failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:15.602602 kubelet[2112]: E1213 14:22:15.602330 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:15.602602 kubelet[2112]: E1213 14:22:15.602391 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb"} Dec 13 14:22:15.602602 kubelet[2112]: E1213 14:22:15.602506 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:15.602602 kubelet[2112]: E1213 14:22:15.602557 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" Dec 13 14:22:16.238000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:16.238000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:16.238000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00208e0c0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:16.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:16.238000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:16.238000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00208e260 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:16.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:16.238000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a73320 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:16.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:16.247000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:16.247000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00208e580 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:22:16.247000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:16.567752 env[1228]: time="2024-12-13T14:22:16.567603806Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:22:16.603717 env[1228]: time="2024-12-13T14:22:16.603641508Z" level=error msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" failed" error="failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:16.604244 kubelet[2112]: E1213 14:22:16.604185 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:16.604768 kubelet[2112]: E1213 14:22:16.604259 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295"} Dec 13 14:22:16.604768 kubelet[2112]: E1213 14:22:16.604311 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:16.604768 kubelet[2112]: E1213 14:22:16.604347 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" Dec 13 14:22:17.566617 env[1228]: time="2024-12-13T14:22:17.566560378Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:22:17.603969 env[1228]: time="2024-12-13T14:22:17.603869080Z" level=error msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" failed" error="failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:17.604592 kubelet[2112]: E1213 14:22:17.604189 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:17.604592 kubelet[2112]: E1213 14:22:17.604259 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b"} Dec 13 14:22:17.604592 kubelet[2112]: E1213 14:22:17.604315 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:17.604592 kubelet[2112]: E1213 14:22:17.604353 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:22:19.566530 env[1228]: time="2024-12-13T14:22:19.566471957Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:22:19.607766 env[1228]: time="2024-12-13T14:22:19.607678145Z" level=error msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" failed" error="failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:19.608097 kubelet[2112]: E1213 14:22:19.607983 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:19.608558 kubelet[2112]: E1213 14:22:19.608058 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a"} Dec 13 14:22:19.608558 kubelet[2112]: E1213 14:22:19.608189 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:19.608558 kubelet[2112]: E1213 14:22:19.608227 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" Dec 13 14:22:20.256320 systemd[1]: Started sshd@9-10.128.0.72:22-139.178.68.195:48054.service. Dec 13 14:22:20.287611 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:22:20.287748 kernel: audit: type=1130 audit(1734099740.255:1045): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.72:22-139.178.68.195:48054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:20.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.72:22-139.178.68.195:48054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:20.547000 audit[3533]: USER_ACCT pid=3533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.551078 sshd[3533]: Accepted publickey for core from 139.178.68.195 port 48054 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:20.579922 kernel: audit: type=1101 audit(1734099740.547:1046): pid=3533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.583843 sshd[3533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:20.584484 kubelet[2112]: I1213 14:22:20.584453 2112 scope.go:117] "RemoveContainer" containerID="c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781" Dec 13 14:22:20.580000 audit[3533]: CRED_ACQ pid=3533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.596915 env[1228]: time="2024-12-13T14:22:20.594155258Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 14:22:20.611079 systemd[1]: Started session-10.scope. Dec 13 14:22:20.611944 kernel: audit: type=1103 audit(1734099740.580:1047): pid=3533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.612359 systemd-logind[1240]: New session 10 of user core. Dec 13 14:22:20.580000 audit[3533]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad84b610 a2=3 a3=0 items=0 ppid=1 pid=3533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.628955 kernel: audit: type=1006 audit(1734099740.580:1048): pid=3533 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:22:20.629025 kernel: audit: type=1300 audit(1734099740.580:1048): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad84b610 a2=3 a3=0 items=0 ppid=1 pid=3533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.650147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3246212133.mount: Deactivated successfully. Dec 13 14:22:20.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:20.667773 env[1228]: time="2024-12-13T14:22:20.667700861Z" level=info msg="CreateContainer within sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\"" Dec 13 14:22:20.620000 audit[3533]: USER_START pid=3533 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.670702 env[1228]: time="2024-12-13T14:22:20.670663136Z" level=info msg="StartContainer for \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\"" Dec 13 14:22:20.702051 kernel: audit: type=1327 audit(1734099740.580:1048): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:20.702219 kernel: audit: type=1105 audit(1734099740.620:1049): pid=3533 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.703855 kernel: audit: type=1103 audit(1734099740.625:1050): pid=3535 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.625000 audit[3535]: CRED_ACQ pid=3535 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.716879 systemd[1]: Started cri-containerd-d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399.scope. Dec 13 14:22:20.736483 systemd[1]: run-containerd-runc-k8s.io-d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399-runc.OWDRdB.mount: Deactivated successfully. Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.801104 kernel: audit: type=1400 audit(1734099740.778:1051): avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fcfbb08a8e8 items=0 ppid=2565 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.835096 kernel: audit: type=1300 audit(1734099740.778:1051): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fcfbb08a8e8 items=0 ppid=2565 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439316630336630323863643238336435396239663530663132633432 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit: BPF prog-id=145 op=LOAD Dec 13 14:22:20.778000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032bbc8 items=0 ppid=2565 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439316630336630323863643238336435396239663530663132633432 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit: BPF prog-id=146 op=LOAD Dec 13 14:22:20.778000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032bc18 items=0 ppid=2565 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439316630336630323863643238336435396239663530663132633432 Dec 13 14:22:20.778000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:22:20.778000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:20.778000 audit: BPF prog-id=147 op=LOAD Dec 13 14:22:20.778000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032bca8 items=0 ppid=2565 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439316630336630323863643238336435396239663530663132633432 Dec 13 14:22:20.862339 env[1228]: time="2024-12-13T14:22:20.862272594Z" level=info msg="StartContainer for \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\" returns successfully" Dec 13 14:22:20.941553 kubelet[2112]: I1213 14:22:20.941105 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6wjg2" podStartSLOduration=26.330462611 podStartE2EDuration="45.941078855s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:21:35.958081856 +0000 UTC m=+23.545135305" lastFinishedPulling="2024-12-13 14:21:55.568698103 +0000 UTC m=+43.155751549" observedRunningTime="2024-12-13 14:21:56.840875166 +0000 UTC m=+44.427928644" watchObservedRunningTime="2024-12-13 14:22:20.941078855 +0000 UTC m=+68.528132322" Dec 13 14:22:20.977402 sshd[3533]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:20.978000 audit[3533]: USER_END pid=3533 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.978000 audit[3533]: CRED_DISP pid=3533 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:20.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.72:22-139.178.68.195:48054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:20.982820 systemd-logind[1240]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:22:20.983163 systemd[1]: sshd@9-10.128.0.72:22-139.178.68.195:48054.service: Deactivated successfully. Dec 13 14:22:20.984399 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:22:20.985831 systemd-logind[1240]: Removed session 10. Dec 13 14:22:21.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.72:22-139.178.68.195:48064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.023054 systemd[1]: Started sshd@10-10.128.0.72:22-139.178.68.195:48064.service. Dec 13 14:22:21.026859 systemd[1]: cri-containerd-d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399.scope: Deactivated successfully. Dec 13 14:22:21.031000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:22:21.074975 env[1228]: time="2024-12-13T14:22:21.074912410Z" level=info msg="shim disconnected" id=d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399 Dec 13 14:22:21.075649 env[1228]: time="2024-12-13T14:22:21.075582181Z" level=warning msg="cleaning up after shim disconnected" id=d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399 namespace=k8s.io Dec 13 14:22:21.075935 env[1228]: time="2024-12-13T14:22:21.075906866Z" level=info msg="cleaning up dead shim" Dec 13 14:22:21.090978 env[1228]: time="2024-12-13T14:22:21.088384476Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3617 runtime=io.containerd.runc.v2\n" Dec 13 14:22:21.318000 audit[3602]: USER_ACCT pid=3602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.320185 sshd[3602]: Accepted publickey for core from 139.178.68.195 port 48064 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:21.320000 audit[3602]: CRED_ACQ pid=3602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.320000 audit[3602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca221e840 a2=3 a3=0 items=0 ppid=1 pid=3602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:21.322143 sshd[3602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:21.327975 systemd-logind[1240]: New session 11 of user core. Dec 13 14:22:21.329291 systemd[1]: Started session-11.scope. Dec 13 14:22:21.336000 audit[3602]: USER_START pid=3602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.339000 audit[3629]: CRED_ACQ pid=3629 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.642174 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399-rootfs.mount: Deactivated successfully. Dec 13 14:22:21.648098 sshd[3602]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:21.649000 audit[3602]: USER_END pid=3602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.649000 audit[3602]: CRED_DISP pid=3602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:21.654085 systemd-logind[1240]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:22:21.654648 systemd[1]: sshd@10-10.128.0.72:22-139.178.68.195:48064.service: Deactivated successfully. Dec 13 14:22:21.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.72:22-139.178.68.195:48064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.658497 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:22:21.662821 systemd-logind[1240]: Removed session 11. Dec 13 14:22:21.695625 systemd[1]: Started sshd@11-10.128.0.72:22-139.178.68.195:48072.service. Dec 13 14:22:21.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.72:22-139.178.68.195:48072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.920701 kubelet[2112]: I1213 14:22:21.916358 2112 scope.go:117] "RemoveContainer" containerID="c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781" Dec 13 14:22:21.920701 kubelet[2112]: I1213 14:22:21.916945 2112 scope.go:117] "RemoveContainer" containerID="d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399" Dec 13 14:22:21.920701 kubelet[2112]: E1213 14:22:21.919240 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-6wjg2_calico-system(cfd4da52-b2fc-454d-a89b-b9dba229bf14)\"" pod="calico-system/calico-node-6wjg2" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" Dec 13 14:22:21.921297 env[1228]: time="2024-12-13T14:22:21.918003979Z" level=info msg="RemoveContainer for \"c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781\"" Dec 13 14:22:21.927638 env[1228]: time="2024-12-13T14:22:21.927570876Z" level=info msg="RemoveContainer for \"c9dbf9dc1947c3cee77a90bbe333471f50b990122cac71038658359b8cf23781\" returns successfully" Dec 13 14:22:22.004000 audit[3636]: USER_ACCT pid=3636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.006209 sshd[3636]: Accepted publickey for core from 139.178.68.195 port 48072 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:22.007000 audit[3636]: CRED_ACQ pid=3636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.007000 audit[3636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc228513e0 a2=3 a3=0 items=0 ppid=1 pid=3636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:22.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:22.008624 sshd[3636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:22.015707 systemd[1]: Started session-12.scope. Dec 13 14:22:22.016385 systemd-logind[1240]: New session 12 of user core. Dec 13 14:22:22.025000 audit[3636]: USER_START pid=3636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.028000 audit[3638]: CRED_ACQ pid=3638 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.298117 sshd[3636]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:22.300000 audit[3636]: USER_END pid=3636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.300000 audit[3636]: CRED_DISP pid=3636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:22.303646 systemd[1]: sshd@11-10.128.0.72:22-139.178.68.195:48072.service: Deactivated successfully. Dec 13 14:22:22.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.72:22-139.178.68.195:48072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:22.304844 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:22:22.306058 systemd-logind[1240]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:22:22.307514 systemd-logind[1240]: Removed session 12. Dec 13 14:22:22.923384 kubelet[2112]: I1213 14:22:22.922301 2112 scope.go:117] "RemoveContainer" containerID="d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399" Dec 13 14:22:22.923384 kubelet[2112]: E1213 14:22:22.923110 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-6wjg2_calico-system(cfd4da52-b2fc-454d-a89b-b9dba229bf14)\"" pod="calico-system/calico-node-6wjg2" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" Dec 13 14:22:25.566470 env[1228]: time="2024-12-13T14:22:25.566405398Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:22:25.601480 env[1228]: time="2024-12-13T14:22:25.601395484Z" level=error msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" failed" error="failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:25.601817 kubelet[2112]: E1213 14:22:25.601729 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:25.602322 kubelet[2112]: E1213 14:22:25.601833 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35"} Dec 13 14:22:25.602322 kubelet[2112]: E1213 14:22:25.601905 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:25.602322 kubelet[2112]: E1213 14:22:25.601945 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88c47553-e788-4fd3-b77f-bd1733a29b49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podUID="88c47553-e788-4fd3-b77f-bd1733a29b49" Dec 13 14:22:27.345174 systemd[1]: Started sshd@12-10.128.0.72:22-139.178.68.195:43206.service. Dec 13 14:22:27.376344 kernel: kauditd_printk_skb: 67 callbacks suppressed Dec 13 14:22:27.376519 kernel: audit: type=1130 audit(1734099747.344:1079): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.72:22-139.178.68.195:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.72:22-139.178.68.195:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.566963 env[1228]: time="2024-12-13T14:22:27.566868195Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:22:27.608657 env[1228]: time="2024-12-13T14:22:27.608505785Z" level=error msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" failed" error="failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:27.609351 kubelet[2112]: E1213 14:22:27.609280 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:27.609814 kubelet[2112]: E1213 14:22:27.609366 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489"} Dec 13 14:22:27.609814 kubelet[2112]: E1213 14:22:27.609414 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:27.609814 kubelet[2112]: E1213 14:22:27.609449 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d5b37a5c-716e-4b9d-b163-b61e3e97284c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podUID="d5b37a5c-716e-4b9d-b163-b61e3e97284c" Dec 13 14:22:27.675274 kernel: audit: type=1101 audit(1734099747.643:1080): pid=3666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.643000 audit[3666]: USER_ACCT pid=3666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.675558 sshd[3666]: Accepted publickey for core from 139.178.68.195 port 43206 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:27.674000 audit[3666]: CRED_ACQ pid=3666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.678018 sshd[3666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:27.690912 systemd[1]: Started session-13.scope. Dec 13 14:22:27.693365 systemd-logind[1240]: New session 13 of user core. Dec 13 14:22:27.703084 kernel: audit: type=1103 audit(1734099747.674:1081): pid=3666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.703227 kernel: audit: type=1006 audit(1734099747.674:1082): pid=3666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:22:27.674000 audit[3666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0fafede0 a2=3 a3=0 items=0 ppid=1 pid=3666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.746757 kernel: audit: type=1300 audit(1734099747.674:1082): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0fafede0 a2=3 a3=0 items=0 ppid=1 pid=3666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:27.747053 kernel: audit: type=1327 audit(1734099747.674:1082): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:27.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:27.703000 audit[3666]: USER_START pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.789098 kernel: audit: type=1105 audit(1734099747.703:1083): pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.789361 kernel: audit: type=1103 audit(1734099747.706:1084): pid=3688 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.706000 audit[3688]: CRED_ACQ pid=3688 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.958332 sshd[3666]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:27.960000 audit[3666]: USER_END pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.961000 audit[3666]: CRED_DISP pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.995788 systemd[1]: sshd@12-10.128.0.72:22-139.178.68.195:43206.service: Deactivated successfully. Dec 13 14:22:27.997072 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:22:27.999248 systemd-logind[1240]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:22:28.001143 systemd-logind[1240]: Removed session 13. Dec 13 14:22:28.018702 kernel: audit: type=1106 audit(1734099747.960:1085): pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:28.018937 kernel: audit: type=1104 audit(1734099747.961:1086): pid=3666 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:27.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.72:22-139.178.68.195:43206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:28.567264 env[1228]: time="2024-12-13T14:22:28.567207778Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:22:28.570682 env[1228]: time="2024-12-13T14:22:28.570537573Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:22:28.626813 env[1228]: time="2024-12-13T14:22:28.626736403Z" level=error msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" failed" error="failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:28.627317 kubelet[2112]: E1213 14:22:28.627252 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:28.627839 kubelet[2112]: E1213 14:22:28.627327 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b"} Dec 13 14:22:28.627839 kubelet[2112]: E1213 14:22:28.627418 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:28.627839 kubelet[2112]: E1213 14:22:28.627465 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7222121-f624-4f42-98c6-6b74db8c612f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mc7jg" podUID="e7222121-f624-4f42-98c6-6b74db8c612f" Dec 13 14:22:28.628632 env[1228]: time="2024-12-13T14:22:28.628559012Z" level=error msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" failed" error="failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:28.628869 kubelet[2112]: E1213 14:22:28.628817 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:28.629018 kubelet[2112]: E1213 14:22:28.628879 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb"} Dec 13 14:22:28.629018 kubelet[2112]: E1213 14:22:28.628964 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:28.629018 kubelet[2112]: E1213 14:22:28.629002 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cee06149-4d07-4e52-aec3-9ed8f8ffeb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podUID="cee06149-4d07-4e52-aec3-9ed8f8ffeb91" Dec 13 14:22:30.568902 env[1228]: time="2024-12-13T14:22:30.568824480Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:22:30.572766 env[1228]: time="2024-12-13T14:22:30.572701459Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:22:30.628634 env[1228]: time="2024-12-13T14:22:30.628556322Z" level=error msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" failed" error="failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:30.629377 kubelet[2112]: E1213 14:22:30.629135 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:30.629377 kubelet[2112]: E1213 14:22:30.629205 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a"} Dec 13 14:22:30.629377 kubelet[2112]: E1213 14:22:30.629255 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:30.629377 kubelet[2112]: E1213 14:22:30.629306 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61cc0cc6-461a-431a-bfe1-2c1336d14ad2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podUID="61cc0cc6-461a-431a-bfe1-2c1336d14ad2" Dec 13 14:22:30.638773 env[1228]: time="2024-12-13T14:22:30.638683013Z" level=error msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" failed" error="failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:22:30.639228 kubelet[2112]: E1213 14:22:30.639160 2112 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:30.639384 kubelet[2112]: E1213 14:22:30.639245 2112 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295"} Dec 13 14:22:30.639384 kubelet[2112]: E1213 14:22:30.639297 2112 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:22:30.639384 kubelet[2112]: E1213 14:22:30.639339 2112 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d45d4b8c-22c2-416b-b434-328c539f2fe5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podUID="d45d4b8c-22c2-416b-b434-328c539f2fe5" Dec 13 14:22:33.028308 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:22:33.028515 kernel: audit: type=1130 audit(1734099753.005:1088): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.72:22-139.178.68.195:43218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.72:22-139.178.68.195:43218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:33.006546 systemd[1]: Started sshd@13-10.128.0.72:22-139.178.68.195:43218.service. Dec 13 14:22:33.312000 audit[3781]: USER_ACCT pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.344022 kernel: audit: type=1101 audit(1734099753.312:1089): pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.344518 sshd[3781]: Accepted publickey for core from 139.178.68.195 port 43218 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:33.343000 audit[3781]: CRED_ACQ pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.345294 sshd[3781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:33.354296 systemd[1]: Started session-14.scope. Dec 13 14:22:33.356400 systemd-logind[1240]: New session 14 of user core. Dec 13 14:22:33.370958 kernel: audit: type=1103 audit(1734099753.343:1090): pid=3781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.343000 audit[3781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe869e9010 a2=3 a3=0 items=0 ppid=1 pid=3781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:33.387962 kernel: audit: type=1006 audit(1734099753.343:1091): pid=3781 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:22:33.388049 kernel: audit: type=1300 audit(1734099753.343:1091): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe869e9010 a2=3 a3=0 items=0 ppid=1 pid=3781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:33.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:33.416114 kernel: audit: type=1327 audit(1734099753.343:1091): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:33.364000 audit[3781]: USER_START pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.457381 kernel: audit: type=1105 audit(1734099753.364:1092): pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.457582 kernel: audit: type=1103 audit(1734099753.369:1093): pid=3783 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.369000 audit[3783]: CRED_ACQ pid=3783 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.619680 sshd[3781]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:33.621000 audit[3781]: USER_END pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.625290 systemd[1]: sshd@13-10.128.0.72:22-139.178.68.195:43218.service: Deactivated successfully. Dec 13 14:22:33.626536 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:22:33.629002 systemd-logind[1240]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:22:33.630627 systemd-logind[1240]: Removed session 14. Dec 13 14:22:33.621000 audit[3781]: CRED_DISP pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.679771 kernel: audit: type=1106 audit(1734099753.621:1094): pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.679976 kernel: audit: type=1104 audit(1734099753.621:1095): pid=3781 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:33.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.72:22-139.178.68.195:43218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:35.917697 env[1228]: time="2024-12-13T14:22:35.917631136Z" level=info msg="StopPodSandbox for \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\"" Dec 13 14:22:35.918374 env[1228]: time="2024-12-13T14:22:35.917742191Z" level=info msg="Container to stop \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.918374 env[1228]: time="2024-12-13T14:22:35.917771692Z" level=info msg="Container to stop \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.918374 env[1228]: time="2024-12-13T14:22:35.917789296Z" level=info msg="Container to stop \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:22:35.923008 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38-shm.mount: Deactivated successfully. Dec 13 14:22:35.959672 systemd[1]: cri-containerd-398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38.scope: Deactivated successfully. Dec 13 14:22:35.959000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:22:35.963000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:22:36.001220 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38-rootfs.mount: Deactivated successfully. Dec 13 14:22:36.035816 env[1228]: time="2024-12-13T14:22:36.035753038Z" level=info msg="shim disconnected" id=398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38 Dec 13 14:22:36.036321 env[1228]: time="2024-12-13T14:22:36.036282398Z" level=warning msg="cleaning up after shim disconnected" id=398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38 namespace=k8s.io Dec 13 14:22:36.036519 env[1228]: time="2024-12-13T14:22:36.036492756Z" level=info msg="cleaning up dead shim" Dec 13 14:22:36.053506 env[1228]: time="2024-12-13T14:22:36.053445743Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3811 runtime=io.containerd.runc.v2\n" Dec 13 14:22:36.054276 env[1228]: time="2024-12-13T14:22:36.054225304Z" level=info msg="TearDown network for sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" successfully" Dec 13 14:22:36.054518 env[1228]: time="2024-12-13T14:22:36.054481941Z" level=info msg="StopPodSandbox for \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" returns successfully" Dec 13 14:22:36.100779 kubelet[2112]: I1213 14:22:36.100732 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-log-dir\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.101548 kubelet[2112]: I1213 14:22:36.100805 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.101708 kubelet[2112]: I1213 14:22:36.101534 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfd4da52-b2fc-454d-a89b-b9dba229bf14-tigera-ca-bundle\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.101905 kubelet[2112]: I1213 14:22:36.101832 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-xtables-lock\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102074 kubelet[2112]: I1213 14:22:36.102055 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-bin-dir\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102220 kubelet[2112]: I1213 14:22:36.102199 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-run-calico\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102363 kubelet[2112]: I1213 14:22:36.102337 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-flexvol-driver-host\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102532 kubelet[2112]: I1213 14:22:36.102510 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cfd4da52-b2fc-454d-a89b-b9dba229bf14-node-certs\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102661 kubelet[2112]: I1213 14:22:36.102643 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-lib-modules\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102803 kubelet[2112]: I1213 14:22:36.102783 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-4kbkq\" (UniqueName: \"kubernetes.io/projected/cfd4da52-b2fc-454d-a89b-b9dba229bf14-kube-api-access-4kbkq\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.102951 kubelet[2112]: I1213 14:22:36.102931 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-policysync\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.103114 kubelet[2112]: I1213 14:22:36.103093 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-net-dir\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.103262 kubelet[2112]: I1213 14:22:36.103240 2112 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-lib-calico\") pod \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\" (UID: \"cfd4da52-b2fc-454d-a89b-b9dba229bf14\") " Dec 13 14:22:36.103481 kubelet[2112]: I1213 14:22:36.103457 2112 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-log-dir\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.103745 kubelet[2112]: I1213 14:22:36.103681 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.103940 kubelet[2112]: I1213 14:22:36.103916 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.104128 kubelet[2112]: I1213 14:22:36.104108 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.104272 kubelet[2112]: I1213 14:22:36.104253 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.104405 kubelet[2112]: I1213 14:22:36.104376 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.105417 kubelet[2112]: I1213 14:22:36.105376 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-policysync" (OuterVolumeSpecName: "policysync") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.105542 kubelet[2112]: I1213 14:22:36.105444 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.105641 kubelet[2112]: I1213 14:22:36.105615 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:22:36.120368 kubelet[2112]: I1213 14:22:36.115917 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/cfd4da52-b2fc-454d-a89b-b9dba229bf14-node-certs" (OuterVolumeSpecName: "node-certs") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:22:36.118269 systemd[1]: var-lib-kubelet-pods-cfd4da52\x2db2fc\x2d454d\x2da89b\x2db9dba229bf14-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:22:36.118462 systemd[1]: var-lib-kubelet-pods-cfd4da52\x2db2fc\x2d454d\x2da89b\x2db9dba229bf14-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:22:36.135379 kubelet[2112]: I1213 14:22:36.131158 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cfd4da52-b2fc-454d-a89b-b9dba229bf14-kube-api-access-4kbkq" (OuterVolumeSpecName: "kube-api-access-4kbkq") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "kube-api-access-4kbkq". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:22:36.135379 kubelet[2112]: I1213 14:22:36.132401 2112 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/cfd4da52-b2fc-454d-a89b-b9dba229bf14-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "cfd4da52-b2fc-454d-a89b-b9dba229bf14" (UID: "cfd4da52-b2fc-454d-a89b-b9dba229bf14"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:22:36.136830 systemd[1]: var-lib-kubelet-pods-cfd4da52\x2db2fc\x2d454d\x2da89b\x2db9dba229bf14-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d4kbkq.mount: Deactivated successfully. Dec 13 14:22:36.176574 kubelet[2112]: I1213 14:22:36.176517 2112 topology_manager.go:215] "Topology Admit Handler" podUID="9716594d-a071-4939-8e00-964aac7ed302" podNamespace="calico-system" podName="calico-node-5pnr6" Dec 13 14:22:36.176828 kubelet[2112]: E1213 14:22:36.176618 2112 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.176828 kubelet[2112]: E1213 14:22:36.176634 2112 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="install-cni" Dec 13 14:22:36.176828 kubelet[2112]: E1213 14:22:36.176645 2112 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="flexvol-driver" Dec 13 14:22:36.176828 kubelet[2112]: E1213 14:22:36.176655 2112 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.176828 kubelet[2112]: I1213 14:22:36.176699 2112 memory_manager.go:354] "RemoveStaleState removing state" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.176828 kubelet[2112]: I1213 14:22:36.176711 2112 memory_manager.go:354] "RemoveStaleState removing state" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.176828 kubelet[2112]: E1213 14:22:36.176745 2112 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.176828 kubelet[2112]: I1213 14:22:36.176782 2112 memory_manager.go:354] "RemoveStaleState removing state" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" containerName="calico-node" Dec 13 14:22:36.185184 systemd[1]: Created slice kubepods-besteffort-pod9716594d_a071_4939_8e00_964aac7ed302.slice. Dec 13 14:22:36.204761 kubelet[2112]: I1213 14:22:36.204711 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9716594d-a071-4939-8e00-964aac7ed302-node-certs\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.205144 kubelet[2112]: I1213 14:22:36.205099 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-var-lib-calico\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.205459 kubelet[2112]: I1213 14:22:36.205420 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9716594d-a071-4939-8e00-964aac7ed302-tigera-ca-bundle\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.205699 kubelet[2112]: I1213 14:22:36.205671 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wxbtf\" (UniqueName: \"kubernetes.io/projected/9716594d-a071-4939-8e00-964aac7ed302-kube-api-access-wxbtf\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.205935 kubelet[2112]: I1213 14:22:36.205881 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-cni-log-dir\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.206166 kubelet[2112]: I1213 14:22:36.206118 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-cni-net-dir\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.206391 kubelet[2112]: I1213 14:22:36.206333 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-flexvol-driver-host\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.206611 kubelet[2112]: I1213 14:22:36.206565 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-lib-modules\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.206846 kubelet[2112]: I1213 14:22:36.206790 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-cni-bin-dir\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.207030 kubelet[2112]: I1213 14:22:36.207007 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-policysync\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.207258 kubelet[2112]: I1213 14:22:36.207236 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-xtables-lock\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.207513 kubelet[2112]: I1213 14:22:36.207490 2112 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9716594d-a071-4939-8e00-964aac7ed302-var-run-calico\") pod \"calico-node-5pnr6\" (UID: \"9716594d-a071-4939-8e00-964aac7ed302\") " pod="calico-system/calico-node-5pnr6" Dec 13 14:22:36.207758 kubelet[2112]: I1213 14:22:36.207736 2112 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-4kbkq\" (UniqueName: \"kubernetes.io/projected/cfd4da52-b2fc-454d-a89b-b9dba229bf14-kube-api-access-4kbkq\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.207952 kubelet[2112]: I1213 14:22:36.207933 2112 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-policysync\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208106 kubelet[2112]: I1213 14:22:36.208088 2112 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-lib-calico\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208249 kubelet[2112]: I1213 14:22:36.208230 2112 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfd4da52-b2fc-454d-a89b-b9dba229bf14-tigera-ca-bundle\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208394 kubelet[2112]: I1213 14:22:36.208377 2112 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-xtables-lock\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208529 kubelet[2112]: I1213 14:22:36.208511 2112 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-bin-dir\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208712 kubelet[2112]: I1213 14:22:36.208691 2112 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-lib-modules\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.208853 kubelet[2112]: I1213 14:22:36.208835 2112 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-flexvol-driver-host\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.209001 kubelet[2112]: I1213 14:22:36.208983 2112 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-cni-net-dir\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.209149 kubelet[2112]: I1213 14:22:36.209128 2112 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cfd4da52-b2fc-454d-a89b-b9dba229bf14-var-run-calico\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.209299 kubelet[2112]: I1213 14:22:36.209280 2112 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cfd4da52-b2fc-454d-a89b-b9dba229bf14-node-certs\") on node \"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:22:36.490007 env[1228]: time="2024-12-13T14:22:36.489815573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5pnr6,Uid:9716594d-a071-4939-8e00-964aac7ed302,Namespace:calico-system,Attempt:0,}" Dec 13 14:22:36.510352 env[1228]: time="2024-12-13T14:22:36.510252164Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:36.510633 env[1228]: time="2024-12-13T14:22:36.510312100Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:36.510633 env[1228]: time="2024-12-13T14:22:36.510330997Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:36.511211 env[1228]: time="2024-12-13T14:22:36.511094225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91 pid=3838 runtime=io.containerd.runc.v2 Dec 13 14:22:36.533366 systemd[1]: Started cri-containerd-afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91.scope. Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.552000 audit: BPF prog-id=148 op=LOAD Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3838 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613161363639383138323462303963316364653834356162363063 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3838 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613161363639383138323462303963316364653834356162363063 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit: BPF prog-id=149 op=LOAD Dec 13 14:22:36.553000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025070 items=0 ppid=3838 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613161363639383138323462303963316364653834356162363063 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit: BPF prog-id=150 op=LOAD Dec 13 14:22:36.553000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000250b8 items=0 ppid=3838 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613161363639383138323462303963316364653834356162363063 Dec 13 14:22:36.553000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:22:36.553000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { perfmon } for pid=3848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit[3848]: AVC avc: denied { bpf } for pid=3848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.553000 audit: BPF prog-id=151 op=LOAD Dec 13 14:22:36.553000 audit[3848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000254c8 items=0 ppid=3838 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166613161363639383138323462303963316364653834356162363063 Dec 13 14:22:36.576999 systemd[1]: Removed slice kubepods-besteffort-podcfd4da52_b2fc_454d_a89b_b9dba229bf14.slice. Dec 13 14:22:36.577180 systemd[1]: kubepods-besteffort-podcfd4da52_b2fc_454d_a89b_b9dba229bf14.slice: Consumed 1.050s CPU time. Dec 13 14:22:36.589576 env[1228]: time="2024-12-13T14:22:36.589511927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5pnr6,Uid:9716594d-a071-4939-8e00-964aac7ed302,Namespace:calico-system,Attempt:0,} returns sandbox id \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\"" Dec 13 14:22:36.593676 env[1228]: time="2024-12-13T14:22:36.593619645Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:22:36.615548 env[1228]: time="2024-12-13T14:22:36.615474546Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927\"" Dec 13 14:22:36.616473 env[1228]: time="2024-12-13T14:22:36.616416662Z" level=info msg="StartContainer for \"60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927\"" Dec 13 14:22:36.647217 systemd[1]: Started cri-containerd-60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927.scope. Dec 13 14:22:36.676000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.676000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbef72f1c68 items=0 ppid=3838 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630636136363231636235656539623231383366336166313330646439 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.677000 audit: BPF prog-id=152 op=LOAD Dec 13 14:22:36.677000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00009e708 items=0 ppid=3838 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630636136363231636235656539623231383366336166313330646439 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.678000 audit: BPF prog-id=153 op=LOAD Dec 13 14:22:36.678000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00009e758 items=0 ppid=3838 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630636136363231636235656539623231383366336166313330646439 Dec 13 14:22:36.679000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:22:36.680000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { perfmon } for pid=3880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit[3880]: AVC avc: denied { bpf } for pid=3880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:36.680000 audit: BPF prog-id=154 op=LOAD Dec 13 14:22:36.680000 audit[3880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00009e7e8 items=0 ppid=3838 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:36.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630636136363231636235656539623231383366336166313330646439 Dec 13 14:22:36.706532 env[1228]: time="2024-12-13T14:22:36.706466519Z" level=info msg="StartContainer for \"60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927\" returns successfully" Dec 13 14:22:36.727452 systemd[1]: cri-containerd-60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927.scope: Deactivated successfully. Dec 13 14:22:36.731000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:22:36.771664 env[1228]: time="2024-12-13T14:22:36.771498493Z" level=info msg="shim disconnected" id=60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927 Dec 13 14:22:36.772428 env[1228]: time="2024-12-13T14:22:36.772391538Z" level=warning msg="cleaning up after shim disconnected" id=60ca6621cb5ee9b2183f3af130dd94ae4b938b62b5c8e3a92c2916fc08af9927 namespace=k8s.io Dec 13 14:22:36.772701 env[1228]: time="2024-12-13T14:22:36.772671386Z" level=info msg="cleaning up dead shim" Dec 13 14:22:36.791759 env[1228]: time="2024-12-13T14:22:36.791700275Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3922 runtime=io.containerd.runc.v2\n" Dec 13 14:22:36.967927 env[1228]: time="2024-12-13T14:22:36.964380217Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:22:36.970827 kubelet[2112]: I1213 14:22:36.970788 2112 scope.go:117] "RemoveContainer" containerID="d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399" Dec 13 14:22:36.989925 env[1228]: time="2024-12-13T14:22:36.987699084Z" level=info msg="RemoveContainer for \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\"" Dec 13 14:22:36.994462 env[1228]: time="2024-12-13T14:22:36.994405228Z" level=info msg="RemoveContainer for \"d91f03f028cd283d59b9f50f12c42983bbad4fa29bfc3069a866fa73ba786399\" returns successfully" Dec 13 14:22:36.994712 kubelet[2112]: I1213 14:22:36.994678 2112 scope.go:117] "RemoveContainer" containerID="5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944" Dec 13 14:22:36.999261 env[1228]: time="2024-12-13T14:22:36.999190399Z" level=info msg="RemoveContainer for \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\"" Dec 13 14:22:37.020169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3122951484.mount: Deactivated successfully. Dec 13 14:22:37.024355 env[1228]: time="2024-12-13T14:22:37.024227922Z" level=info msg="RemoveContainer for \"5c77914cf40a009543dc7eba6250bbf0977881ba540abcbc80eca117a501d944\" returns successfully" Dec 13 14:22:37.027454 kubelet[2112]: I1213 14:22:37.027403 2112 scope.go:117] "RemoveContainer" containerID="46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726" Dec 13 14:22:37.031766 env[1228]: time="2024-12-13T14:22:37.031716394Z" level=info msg="RemoveContainer for \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\"" Dec 13 14:22:37.041709 env[1228]: time="2024-12-13T14:22:37.041392638Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852\"" Dec 13 14:22:37.045066 env[1228]: time="2024-12-13T14:22:37.045016178Z" level=info msg="RemoveContainer for \"46bf45fc2ebdca47afb0407bace7289769b7979877e4dfc5404b8cc390f27726\" returns successfully" Dec 13 14:22:37.046281 env[1228]: time="2024-12-13T14:22:37.046241010Z" level=info msg="StartContainer for \"64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852\"" Dec 13 14:22:37.097024 systemd[1]: Started cri-containerd-64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852.scope. Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7faee41b3148 items=0 ppid=3838 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613632616239333839323735373634363437623330383263303532 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.126000 audit: BPF prog-id=155 op=LOAD Dec 13 14:22:37.126000 audit[3947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003c6218 items=0 ppid=3838 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613632616239333839323735373634363437623330383263303532 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit: BPF prog-id=156 op=LOAD Dec 13 14:22:37.128000 audit[3947]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003c6268 items=0 ppid=3838 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613632616239333839323735373634363437623330383263303532 Dec 13 14:22:37.128000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:22:37.128000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:37.128000 audit: BPF prog-id=157 op=LOAD Dec 13 14:22:37.128000 audit[3947]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003c62f8 items=0 ppid=3838 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613632616239333839323735373634363437623330383263303532 Dec 13 14:22:37.152017 env[1228]: time="2024-12-13T14:22:37.151951848Z" level=info msg="StartContainer for \"64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852\" returns successfully" Dec 13 14:22:37.729830 systemd[1]: cri-containerd-64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852.scope: Deactivated successfully. Dec 13 14:22:37.734000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:22:37.771199 env[1228]: time="2024-12-13T14:22:37.771124102Z" level=info msg="shim disconnected" id=64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852 Dec 13 14:22:37.771199 env[1228]: time="2024-12-13T14:22:37.771199693Z" level=warning msg="cleaning up after shim disconnected" id=64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852 namespace=k8s.io Dec 13 14:22:37.771199 env[1228]: time="2024-12-13T14:22:37.771215191Z" level=info msg="cleaning up dead shim" Dec 13 14:22:37.782948 env[1228]: time="2024-12-13T14:22:37.782858006Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:22:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3987 runtime=io.containerd.runc.v2\n" Dec 13 14:22:37.922049 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64a62ab9389275764647b3082c052378280a680c8c7a8059b13967f371761852-rootfs.mount: Deactivated successfully. Dec 13 14:22:38.008901 env[1228]: time="2024-12-13T14:22:38.004247936Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:22:38.037368 env[1228]: time="2024-12-13T14:22:38.037284457Z" level=info msg="CreateContainer within sandbox \"afa1a66981824b09c1cde845ab60c6d4102f2fd15570f844b8df2df3e0d05f91\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84\"" Dec 13 14:22:38.038489 env[1228]: time="2024-12-13T14:22:38.038447898Z" level=info msg="StartContainer for \"44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84\"" Dec 13 14:22:38.078821 systemd[1]: Started cri-containerd-44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84.scope. Dec 13 14:22:38.122546 kernel: kauditd_printk_skb: 148 callbacks suppressed Dec 13 14:22:38.122737 kernel: audit: type=1400 audit(1734099758.105:1131): avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.105000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.134635 kernel: audit: type=1300 audit(1734099758.105:1131): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8bfc145d58 items=0 ppid=3838 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.105000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8bfc145d58 items=0 ppid=3838 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434633866346439303566373036666335316135616363386534353239 Dec 13 14:22:38.196966 kernel: audit: type=1327 audit(1734099758.105:1131): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434633866346439303566373036666335316135616363386534353239 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.239374 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.239549 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.260445 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.261667 env[1228]: time="2024-12-13T14:22:38.261083817Z" level=info msg="StartContainer for \"44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84\" returns successfully" Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.283138 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.325450 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.325575 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.325631 kernel: audit: type=1400 audit(1734099758.106:1132): avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit: BPF prog-id=158 op=LOAD Dec 13 14:22:38.106000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000303468 items=0 ppid=3838 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434633866346439303566373036666335316135616363386534353239 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit: BPF prog-id=159 op=LOAD Dec 13 14:22:38.106000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003034b8 items=0 ppid=3838 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434633866346439303566373036666335316135616363386534353239 Dec 13 14:22:38.106000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:22:38.106000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:38.106000 audit: BPF prog-id=160 op=LOAD Dec 13 14:22:38.106000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000303548 items=0 ppid=3838 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:38.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434633866346439303566373036666335316135616363386534353239 Dec 13 14:22:38.571803 env[1228]: time="2024-12-13T14:22:38.569825939Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:22:38.575440 kubelet[2112]: I1213 14:22:38.574333 2112 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="cfd4da52-b2fc-454d-a89b-b9dba229bf14" path="/var/lib/kubelet/pods/cfd4da52-b2fc-454d-a89b-b9dba229bf14/volumes" Dec 13 14:22:38.671802 systemd[1]: Started sshd@14-10.128.0.72:22-139.178.68.195:43980.service. Dec 13 14:22:38.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.72:22-139.178.68.195:43980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.718 [INFO][4063] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.719 [INFO][4063] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" iface="eth0" netns="/var/run/netns/cni-8c7103ba-e507-80df-3f77-f71160de0579" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.719 [INFO][4063] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" iface="eth0" netns="/var/run/netns/cni-8c7103ba-e507-80df-3f77-f71160de0579" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.719 [INFO][4063] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" iface="eth0" netns="/var/run/netns/cni-8c7103ba-e507-80df-3f77-f71160de0579" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.719 [INFO][4063] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.719 [INFO][4063] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.769 [INFO][4072] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.769 [INFO][4072] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.769 [INFO][4072] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.781 [WARNING][4072] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.781 [INFO][4072] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.787 [INFO][4072] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:38.795919 env[1228]: 2024-12-13 14:22:38.791 [INFO][4063] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:22:38.799581 env[1228]: time="2024-12-13T14:22:38.799521153Z" level=info msg="TearDown network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" successfully" Dec 13 14:22:38.799826 env[1228]: time="2024-12-13T14:22:38.799782728Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" returns successfully" Dec 13 14:22:38.802528 env[1228]: time="2024-12-13T14:22:38.802480996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-zskrp,Uid:88c47553-e788-4fd3-b77f-bd1733a29b49,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:22:38.926777 systemd[1]: run-netns-cni\x2d8c7103ba\x2de507\x2d80df\x2d3f77\x2df71160de0579.mount: Deactivated successfully. Dec 13 14:22:39.009000 audit[4069]: USER_ACCT pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.012082 sshd[4069]: Accepted publickey for core from 139.178.68.195 port 43980 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:39.017000 audit[4069]: CRED_ACQ pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.029000 audit[4069]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c5c1590 a2=3 a3=0 items=0 ppid=1 pid=4069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:39.031756 sshd[4069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:39.046048 systemd[1]: run-containerd-runc-k8s.io-44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84-runc.qIBblI.mount: Deactivated successfully. Dec 13 14:22:39.060014 systemd[1]: Started session-15.scope. Dec 13 14:22:39.061368 systemd-logind[1240]: New session 15 of user core. Dec 13 14:22:39.075000 audit[4069]: USER_START pid=4069 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.078000 audit[4116]: CRED_ACQ pid=4116 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.161232 systemd-networkd[1032]: calif05a8ba679e: Link UP Dec 13 14:22:39.170926 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:39.179933 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif05a8ba679e: link becomes ready Dec 13 14:22:39.188242 systemd-networkd[1032]: calif05a8ba679e: Gained carrier Dec 13 14:22:39.210706 kubelet[2112]: I1213 14:22:39.210635 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5pnr6" podStartSLOduration=3.210605609 podStartE2EDuration="3.210605609s" podCreationTimestamp="2024-12-13 14:22:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:39.04007969 +0000 UTC m=+86.627133157" watchObservedRunningTime="2024-12-13 14:22:39.210605609 +0000 UTC m=+86.797659117" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:38.876 [INFO][4078] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:38.906 [INFO][4078] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0 calico-apiserver-75bc9dcd5f- calico-apiserver 88c47553-e788-4fd3-b77f-bd1733a29b49 1007 0 2024-12-13 14:21:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75bc9dcd5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal calico-apiserver-75bc9dcd5f-zskrp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif05a8ba679e [] []}} ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:38.906 [INFO][4078] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:38.982 [INFO][4094] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" HandleID="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.051 [INFO][4094] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" HandleID="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290ae0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"calico-apiserver-75bc9dcd5f-zskrp", "timestamp":"2024-12-13 14:22:38.98202887 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.051 [INFO][4094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.051 [INFO][4094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.051 [INFO][4094] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.066 [INFO][4094] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.088 [INFO][4094] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.108 [INFO][4094] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.114 [INFO][4094] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.117 [INFO][4094] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.118 [INFO][4094] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.120 [INFO][4094] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727 Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.126 [INFO][4094] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.136 [INFO][4094] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.129/26] block=192.168.3.128/26 handle="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.137 [INFO][4094] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.129/26] handle="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.137 [INFO][4094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:39.212769 env[1228]: 2024-12-13 14:22:39.137 [INFO][4094] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.129/26] IPv6=[] ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" HandleID="k8s-pod-network.a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.139 [INFO][4078] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"88c47553-e788-4fd3-b77f-bd1733a29b49", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-75bc9dcd5f-zskrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif05a8ba679e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.139 [INFO][4078] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.129/32] ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.139 [INFO][4078] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif05a8ba679e ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.189 [INFO][4078] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.189 [INFO][4078] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"88c47553-e788-4fd3-b77f-bd1733a29b49", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727", Pod:"calico-apiserver-75bc9dcd5f-zskrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif05a8ba679e", MAC:"b6:dc:67:4d:b6:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:39.214532 env[1228]: 2024-12-13 14:22:39.210 [INFO][4078] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-zskrp" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:22:39.259544 env[1228]: time="2024-12-13T14:22:39.259440943Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:39.259815 env[1228]: time="2024-12-13T14:22:39.259572639Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:39.259815 env[1228]: time="2024-12-13T14:22:39.259659492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:39.260015 env[1228]: time="2024-12-13T14:22:39.259965595Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727 pid=4154 runtime=io.containerd.runc.v2 Dec 13 14:22:39.305430 systemd[1]: Started cri-containerd-a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727.scope. Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.348000 audit: BPF prog-id=161 op=LOAD Dec 13 14:22:39.350000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.350000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4154 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134346435326665623231636538326361353138356330623930666163 Dec 13 14:22:39.350000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.350000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4154 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134346435326665623231636538326361353138356330623930666163 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.351000 audit: BPF prog-id=162 op=LOAD Dec 13 14:22:39.351000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000273e90 items=0 ppid=4154 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134346435326665623231636538326361353138356330623930666163 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.352000 audit: BPF prog-id=163 op=LOAD Dec 13 14:22:39.352000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000273ed8 items=0 ppid=4154 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134346435326665623231636538326361353138356330623930666163 Dec 13 14:22:39.353000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:22:39.354000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:39.354000 audit: BPF prog-id=164 op=LOAD Dec 13 14:22:39.354000 audit[4163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e82e8 items=0 ppid=4154 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:39.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134346435326665623231636538326361353138356330623930666163 Dec 13 14:22:39.449785 sshd[4069]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:39.459000 audit[4069]: USER_END pid=4069 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.459000 audit[4069]: CRED_DISP pid=4069 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:39.463281 systemd[1]: sshd@14-10.128.0.72:22-139.178.68.195:43980.service: Deactivated successfully. Dec 13 14:22:39.464519 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:22:39.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.72:22-139.178.68.195:43980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:39.469663 systemd-logind[1240]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:22:39.472535 systemd-logind[1240]: Removed session 15. Dec 13 14:22:39.475602 env[1228]: time="2024-12-13T14:22:39.475548133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-zskrp,Uid:88c47553-e788-4fd3-b77f-bd1733a29b49,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727\"" Dec 13 14:22:39.480769 env[1228]: time="2024-12-13T14:22:39.480722721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:22:40.067611 systemd[1]: run-containerd-runc-k8s.io-44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84-runc.J3XQ8m.mount: Deactivated successfully. Dec 13 14:22:40.144000 audit[4250]: AVC avc: denied { write } for pid=4250 comm="tee" name="fd" dev="proc" ino=27115 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.144000 audit[4250]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe22d0f9b9 a2=241 a3=1b6 items=1 ppid=4200 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.144000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:22:40.144000 audit: PATH item=0 name="/dev/fd/63" inode=27081 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.165000 audit[4261]: AVC avc: denied { write } for pid=4261 comm="tee" name="fd" dev="proc" ino=27125 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.166000 audit[4264]: AVC avc: denied { write } for pid=4264 comm="tee" name="fd" dev="proc" ino=27128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.167000 audit[4266]: AVC avc: denied { write } for pid=4266 comm="tee" name="fd" dev="proc" ino=27131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.167000 audit[4266]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffff9b69c9 a2=241 a3=1b6 items=1 ppid=4204 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.167000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:22:40.167000 audit: PATH item=0 name="/dev/fd/63" inode=27109 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.166000 audit[4264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff335929c8 a2=241 a3=1b6 items=1 ppid=4198 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.165000 audit[4261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5e5f09b8 a2=241 a3=1b6 items=1 ppid=4207 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.166000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:22:40.166000 audit: PATH item=0 name="/dev/fd/63" inode=27106 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.165000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:22:40.165000 audit: PATH item=0 name="/dev/fd/63" inode=27103 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.165000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.185000 audit[4276]: AVC avc: denied { write } for pid=4276 comm="tee" name="fd" dev="proc" ino=27136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.185000 audit[4276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec35d59ca a2=241 a3=1b6 items=1 ppid=4217 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.185000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:22:40.185000 audit: PATH item=0 name="/dev/fd/63" inode=27117 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.185000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.205000 audit[4272]: AVC avc: denied { write } for pid=4272 comm="tee" name="fd" dev="proc" ino=27162 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.205000 audit[4272]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4d4379c8 a2=241 a3=1b6 items=1 ppid=4211 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.205000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:22:40.205000 audit: PATH item=0 name="/dev/fd/63" inode=27904 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.227000 audit[4287]: AVC avc: denied { write } for pid=4287 comm="tee" name="fd" dev="proc" ino=27167 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:22:40.227000 audit[4287]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc923439c8 a2=241 a3=1b6 items=1 ppid=4220 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.227000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:22:40.227000 audit: PATH item=0 name="/dev/fd/63" inode=27135 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:40.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.400000 audit: BPF prog-id=165 op=LOAD Dec 13 14:22:40.400000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec38f8f80 a2=98 a3=3 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.401000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit: BPF prog-id=166 op=LOAD Dec 13 14:22:40.402000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec38f8d60 a2=74 a3=540051 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.402000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.402000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:40.402000 audit: BPF prog-id=167 op=LOAD Dec 13 14:22:40.402000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec38f8d90 a2=94 a3=2 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:40.402000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:40.402000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:22:40.548717 systemd-networkd[1032]: calif05a8ba679e: Gained IPv6LL Dec 13 14:22:40.570333 env[1228]: time="2024-12-13T14:22:40.570279522Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.767 [INFO][4322] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.767 [INFO][4322] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" iface="eth0" netns="/var/run/netns/cni-3972177f-1ec1-f2a8-2900-a182c8041404" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.767 [INFO][4322] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" iface="eth0" netns="/var/run/netns/cni-3972177f-1ec1-f2a8-2900-a182c8041404" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.768 [INFO][4322] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" iface="eth0" netns="/var/run/netns/cni-3972177f-1ec1-f2a8-2900-a182c8041404" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.768 [INFO][4322] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.768 [INFO][4322] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.827 [INFO][4329] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.827 [INFO][4329] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.827 [INFO][4329] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.838 [WARNING][4329] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.838 [INFO][4329] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.841 [INFO][4329] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:40.845562 env[1228]: 2024-12-13 14:22:40.843 [INFO][4322] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:22:40.851122 env[1228]: time="2024-12-13T14:22:40.851027857Z" level=info msg="TearDown network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" successfully" Dec 13 14:22:40.851122 env[1228]: time="2024-12-13T14:22:40.851108219Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" returns successfully" Dec 13 14:22:40.852382 env[1228]: time="2024-12-13T14:22:40.852338703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd4dcdc94-f8666,Uid:cee06149-4d07-4e52-aec3-9ed8f8ffeb91,Namespace:calico-system,Attempt:1,}" Dec 13 14:22:40.854521 systemd[1]: run-netns-cni\x2d3972177f\x2d1ec1\x2df2a8\x2d2900\x2da182c8041404.mount: Deactivated successfully. Dec 13 14:22:41.244731 systemd-networkd[1032]: cali5d9812959d1: Link UP Dec 13 14:22:41.252080 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:41.265327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d9812959d1: link becomes ready Dec 13 14:22:41.265021 systemd-networkd[1032]: cali5d9812959d1: Gained carrier Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.028 [INFO][4335] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0 calico-kube-controllers-5bd4dcdc94- calico-system cee06149-4d07-4e52-aec3-9ed8f8ffeb91 1042 0 2024-12-13 14:21:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5bd4dcdc94 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal calico-kube-controllers-5bd4dcdc94-f8666 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5d9812959d1 [] []}} ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.028 [INFO][4335] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.147 [INFO][4346] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" HandleID="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.176 [INFO][4346] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" HandleID="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"calico-kube-controllers-5bd4dcdc94-f8666", "timestamp":"2024-12-13 14:22:41.147881699 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.176 [INFO][4346] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.176 [INFO][4346] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.177 [INFO][4346] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.180 [INFO][4346] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.186 [INFO][4346] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.192 [INFO][4346] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.199 [INFO][4346] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.204 [INFO][4346] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.204 [INFO][4346] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.206 [INFO][4346] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.217 [INFO][4346] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.239 [INFO][4346] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.130/26] block=192.168.3.128/26 handle="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.240 [INFO][4346] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.130/26] handle="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.240 [INFO][4346] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:41.302711 env[1228]: 2024-12-13 14:22:41.240 [INFO][4346] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.130/26] IPv6=[] ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" HandleID="k8s-pod-network.162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.242 [INFO][4335] cni-plugin/k8s.go 386: Populated endpoint ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0", GenerateName:"calico-kube-controllers-5bd4dcdc94-", Namespace:"calico-system", SelfLink:"", UID:"cee06149-4d07-4e52-aec3-9ed8f8ffeb91", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd4dcdc94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-5bd4dcdc94-f8666", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d9812959d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.242 [INFO][4335] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.130/32] ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.242 [INFO][4335] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5d9812959d1 ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.275 [INFO][4335] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.275 [INFO][4335] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0", GenerateName:"calico-kube-controllers-5bd4dcdc94-", Namespace:"calico-system", SelfLink:"", UID:"cee06149-4d07-4e52-aec3-9ed8f8ffeb91", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd4dcdc94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb", Pod:"calico-kube-controllers-5bd4dcdc94-f8666", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d9812959d1", MAC:"a2:ed:97:c4:3c:fb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:41.304113 env[1228]: 2024-12-13 14:22:41.300 [INFO][4335] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb" Namespace="calico-system" Pod="calico-kube-controllers-5bd4dcdc94-f8666" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:22:41.352142 env[1228]: time="2024-12-13T14:22:41.351991149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:41.352439 env[1228]: time="2024-12-13T14:22:41.352397307Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:41.352610 env[1228]: time="2024-12-13T14:22:41.352577956Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:41.352966 env[1228]: time="2024-12-13T14:22:41.352926446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb pid=4389 runtime=io.containerd.runc.v2 Dec 13 14:22:41.410128 systemd[1]: Started cri-containerd-162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb.scope. Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.475000 audit: BPF prog-id=168 op=LOAD Dec 13 14:22:41.476000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.476000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4389 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136326530623766396237323038383136393131336435313235623137 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4389 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136326530623766396237323038383136393131336435313235623137 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.477000 audit: BPF prog-id=169 op=LOAD Dec 13 14:22:41.477000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000196f20 items=0 ppid=4389 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136326530623766396237323038383136393131336435313235623137 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.479000 audit: BPF prog-id=170 op=LOAD Dec 13 14:22:41.479000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000196f68 items=0 ppid=4389 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136326530623766396237323038383136393131336435313235623137 Dec 13 14:22:41.480000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:22:41.480000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { perfmon } for pid=4399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit[4399]: AVC avc: denied { bpf } for pid=4399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.480000 audit: BPF prog-id=171 op=LOAD Dec 13 14:22:41.480000 audit[4399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000197378 items=0 ppid=4389 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136326530623766396237323038383136393131336435313235623137 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit: BPF prog-id=172 op=LOAD Dec 13 14:22:41.521000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec38f8c50 a2=40 a3=1 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.521000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:22:41.521000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.521000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec38f8d20 a2=50 a3=7ffec38f8e00 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.521000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.554000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.554000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8c60 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.554000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec38f8c90 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec38f8ba0 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8cb0 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8c90 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8c80 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8cb0 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec38f8c90 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec38f8cb0 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.555000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.555000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec38f8c80 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.555000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec38f8cf0 a2=28 a3=0 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.558000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec38f8aa0 a2=50 a3=1 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.558000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.558000 audit: BPF prog-id=173 op=LOAD Dec 13 14:22:41.558000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec38f8aa0 a2=94 a3=5 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.558000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.560000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec38f8b50 a2=50 a3=1 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec38f8c70 a2=4 a3=38 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.560000 audit[4306]: AVC avc: denied { confidentiality } for pid=4306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.560000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec38f8cc0 a2=94 a3=6 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { confidentiality } for pid=4306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.563000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec38f8470 a2=94 a3=83 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.563000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.563000 audit[4306]: AVC avc: denied { confidentiality } for pid=4306 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:41.563000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec38f8470 a2=94 a3=83 items=0 ppid=4199 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.563000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:22:41.571388 env[1228]: time="2024-12-13T14:22:41.568330120Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit: BPF prog-id=174 op=LOAD Dec 13 14:22:41.593000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed4edd4e0 a2=98 a3=1999999999999999 items=0 ppid=4199 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.593000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.593000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit: BPF prog-id=175 op=LOAD Dec 13 14:22:41.593000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed4edd3c0 a2=74 a3=ffff items=0 ppid=4199 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.593000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.593000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.593000 audit: BPF prog-id=176 op=LOAD Dec 13 14:22:41.593000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed4edd400 a2=40 a3=7ffed4edd5e0 items=0 ppid=4199 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.593000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:22:41.593000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:22:41.608835 env[1228]: time="2024-12-13T14:22:41.608721484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bd4dcdc94-f8666,Uid:cee06149-4d07-4e52-aec3-9ed8f8ffeb91,Namespace:calico-system,Attempt:1,} returns sandbox id \"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb\"" Dec 13 14:22:41.762628 systemd-networkd[1032]: vxlan.calico: Link UP Dec 13 14:22:41.762641 systemd-networkd[1032]: vxlan.calico: Gained carrier Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.785000 audit: BPF prog-id=177 op=LOAD Dec 13 14:22:41.785000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe776c1280 a2=98 a3=ffffffff items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.785000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.786000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit: BPF prog-id=178 op=LOAD Dec 13 14:22:41.786000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe776c1090 a2=74 a3=540051 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.786000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit: BPF prog-id=179 op=LOAD Dec 13 14:22:41.786000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe776c10c0 a2=94 a3=2 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.786000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c0f90 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe776c0fc0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.786000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.786000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe776c0ed0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.786000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.787000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.787000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c0fe0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.787000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.787000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c0fc0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.787000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.787000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c0fb0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.787000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.787000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c0fe0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.787000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe776c0fc0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe776c0fe0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe776c0fb0 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe776c1020 a2=28 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.788000 audit: BPF prog-id=180 op=LOAD Dec 13 14:22:41.788000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe776c0e90 a2=40 a3=0 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.788000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.788000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe776c0e80 a2=50 a3=2800 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe776c0e80 a2=50 a3=2800 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.791000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe776c06a0 a2=94 a3=2 items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.792000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.792000 audit: BPF prog-id=182 op=LOAD Dec 13 14:22:41.792000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe776c07a0 a2=94 a3=2d items=0 ppid=4199 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.792000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit: BPF prog-id=183 op=LOAD Dec 13 14:22:41.804000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd16cc670 a2=98 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.804000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.804000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit: BPF prog-id=184 op=LOAD Dec 13 14:22:41.804000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd16cc450 a2=74 a3=540051 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.804000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.804000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:41.804000 audit: BPF prog-id=185 op=LOAD Dec 13 14:22:41.804000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd16cc480 a2=94 a3=2 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:41.804000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:41.805000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.778 [INFO][4449] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.778 [INFO][4449] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" iface="eth0" netns="/var/run/netns/cni-274163ed-fe8e-b7b2-c5ea-61cc7ae45258" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.778 [INFO][4449] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" iface="eth0" netns="/var/run/netns/cni-274163ed-fe8e-b7b2-c5ea-61cc7ae45258" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.783 [INFO][4449] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" iface="eth0" netns="/var/run/netns/cni-274163ed-fe8e-b7b2-c5ea-61cc7ae45258" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.783 [INFO][4449] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.783 [INFO][4449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.909 [INFO][4470] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.910 [INFO][4470] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.910 [INFO][4470] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.921 [WARNING][4470] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.921 [INFO][4470] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.926 [INFO][4470] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:41.933030 env[1228]: 2024-12-13 14:22:41.929 [INFO][4449] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:22:41.934235 env[1228]: time="2024-12-13T14:22:41.934181538Z" level=info msg="TearDown network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" successfully" Dec 13 14:22:41.934391 env[1228]: time="2024-12-13T14:22:41.934363387Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" returns successfully" Dec 13 14:22:41.938436 systemd[1]: run-netns-cni\x2d274163ed\x2dfe8e\x2db7b2\x2dc5ea\x2d61cc7ae45258.mount: Deactivated successfully. Dec 13 14:22:41.943995 env[1228]: time="2024-12-13T14:22:41.939720101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mc7jg,Uid:e7222121-f624-4f42-98c6-6b74db8c612f,Namespace:calico-system,Attempt:1,}" Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.146000 audit: BPF prog-id=186 op=LOAD Dec 13 14:22:42.146000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd16cc340 a2=40 a3=1 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.147000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:22:42.147000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.147000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcd16cc410 a2=50 a3=7ffcd16cc4f0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.172000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.172000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc350 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.172000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd16cc380 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd16cc290 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc3a0 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc380 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc370 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc3a0 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd16cc380 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd16cc3a0 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd16cc370 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd16cc3e0 a2=28 a3=0 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd16cc190 a2=50 a3=1 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit: BPF prog-id=187 op=LOAD Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd16cc190 a2=94 a3=5 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd16cc240 a2=50 a3=1 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcd16cc360 a2=4 a3=38 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.173000 audit[4474]: AVC avc: denied { confidentiality } for pid=4474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:42.173000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd16cc3b0 a2=94 a3=6 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { confidentiality } for pid=4474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:42.174000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd16cbb60 a2=94 a3=83 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.174000 audit[4474]: AVC avc: denied { confidentiality } for pid=4474 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:22:42.174000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd16cbb60 a2=94 a3=83 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.175000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.175000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd16cd5a0 a2=10 a3=f1f00800 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.175000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.175000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd16cd440 a2=10 a3=3 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.175000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.175000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd16cd3e0 a2=10 a3=3 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.175000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.175000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcd16cd3e0 a2=10 a3=7 items=0 ppid=4199 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:22:42.186000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:22:42.266221 systemd-networkd[1032]: caliec7a3822b35: Link UP Dec 13 14:22:42.276923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec7a3822b35: link becomes ready Dec 13 14:22:42.280321 systemd-networkd[1032]: caliec7a3822b35: Gained carrier Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.099 [INFO][4483] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0 csi-node-driver- calico-system e7222121-f624-4f42-98c6-6b74db8c612f 1052 0 2024-12-13 14:21:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal csi-node-driver-mc7jg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliec7a3822b35 [] []}} ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.099 [INFO][4483] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.190 [INFO][4497] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" HandleID="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.216 [INFO][4497] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" HandleID="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"csi-node-driver-mc7jg", "timestamp":"2024-12-13 14:22:42.190801137 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.216 [INFO][4497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.217 [INFO][4497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.217 [INFO][4497] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.219 [INFO][4497] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.226 [INFO][4497] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.232 [INFO][4497] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.234 [INFO][4497] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.237 [INFO][4497] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.237 [INFO][4497] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.239 [INFO][4497] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386 Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.245 [INFO][4497] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.257 [INFO][4497] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.131/26] block=192.168.3.128/26 handle="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.257 [INFO][4497] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.131/26] handle="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.257 [INFO][4497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:42.304321 env[1228]: 2024-12-13 14:22:42.257 [INFO][4497] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.131/26] IPv6=[] ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" HandleID="k8s-pod-network.47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.259 [INFO][4483] cni-plugin/k8s.go 386: Populated endpoint ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7222121-f624-4f42-98c6-6b74db8c612f", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-mc7jg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliec7a3822b35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.259 [INFO][4483] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.131/32] ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.259 [INFO][4483] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec7a3822b35 ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.281 [INFO][4483] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.282 [INFO][4483] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7222121-f624-4f42-98c6-6b74db8c612f", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386", Pod:"csi-node-driver-mc7jg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliec7a3822b35", MAC:"86:ee:5e:7e:c5:6a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:42.305593 env[1228]: 2024-12-13 14:22:42.299 [INFO][4483] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386" Namespace="calico-system" Pod="csi-node-driver-mc7jg" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:22:42.377376 env[1228]: time="2024-12-13T14:22:42.377259799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:42.377629 env[1228]: time="2024-12-13T14:22:42.377571277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:42.378135 env[1228]: time="2024-12-13T14:22:42.378064731Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:42.378431 env[1228]: time="2024-12-13T14:22:42.378366138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386 pid=4536 runtime=io.containerd.runc.v2 Dec 13 14:22:42.423000 audit[4547]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=4547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:42.423000 audit[4547]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffddce9d560 a2=0 a3=7ffddce9d54c items=0 ppid=4199 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.423000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.452826 systemd[1]: Started cri-containerd-47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386.scope. Dec 13 14:22:42.475000 audit[4568]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:42.475000 audit[4568]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe19204ba0 a2=0 a3=7ffe19204b8c items=0 ppid=4199 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.475000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.487000 audit[4566]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4566 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:42.487000 audit[4566]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd3643e860 a2=0 a3=7ffd3643e84c items=0 ppid=4199 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.487000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.513000 audit[4571]: NETFILTER_CFG table=filter:100 family=2 entries=105 op=nft_register_chain pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.513000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=58184 a0=3 a1=7ffca871a530 a2=0 a3=7ffca871a51c items=0 ppid=4199 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.516000 audit: BPF prog-id=188 op=LOAD Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4536 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373130653234396636363933633338336639663036363063313266 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4536 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373130653234396636363933633338336639663036363063313266 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.518000 audit: BPF prog-id=189 op=LOAD Dec 13 14:22:42.518000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000218460 items=0 ppid=4536 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373130653234396636363933633338336639663036363063313266 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit: BPF prog-id=190 op=LOAD Dec 13 14:22:42.519000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002184a8 items=0 ppid=4536 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373130653234396636363933633338336639663036363063313266 Dec 13 14:22:42.519000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:22:42.519000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { perfmon } for pid=4553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit[4553]: AVC avc: denied { bpf } for pid=4553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:42.519000 audit: BPF prog-id=191 op=LOAD Dec 13 14:22:42.519000 audit[4553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002188b8 items=0 ppid=4536 pid=4553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437373130653234396636363933633338336639663036363063313266 Dec 13 14:22:42.557421 env[1228]: time="2024-12-13T14:22:42.557358290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mc7jg,Uid:e7222121-f624-4f42-98c6-6b74db8c612f,Namespace:calico-system,Attempt:1,} returns sandbox id \"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386\"" Dec 13 14:22:42.571534 env[1228]: time="2024-12-13T14:22:42.571477612Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:22:42.587880 env[1228]: time="2024-12-13T14:22:42.587818764Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:22:42.607000 audit[4600]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:42.607000 audit[4600]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffeb39ba350 a2=0 a3=7ffeb39ba33c items=0 ppid=4199 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:42.607000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.729 [INFO][4613] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.731 [INFO][4613] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" iface="eth0" netns="/var/run/netns/cni-67bdda49-0bb5-2b56-edc2-4761ac475760" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.732 [INFO][4613] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" iface="eth0" netns="/var/run/netns/cni-67bdda49-0bb5-2b56-edc2-4761ac475760" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.733 [INFO][4613] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" iface="eth0" netns="/var/run/netns/cni-67bdda49-0bb5-2b56-edc2-4761ac475760" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.733 [INFO][4613] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.733 [INFO][4613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.808 [INFO][4627] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.809 [INFO][4627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.809 [INFO][4627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.833 [WARNING][4627] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.833 [INFO][4627] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.835 [INFO][4627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:42.843085 env[1228]: 2024-12-13 14:22:42.837 [INFO][4613] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:22:42.843085 env[1228]: time="2024-12-13T14:22:42.840217630Z" level=info msg="TearDown network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" successfully" Dec 13 14:22:42.843085 env[1228]: time="2024-12-13T14:22:42.840264858Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" returns successfully" Dec 13 14:22:42.845545 env[1228]: time="2024-12-13T14:22:42.845500203Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wmkdc,Uid:d5b37a5c-716e-4b9d-b163-b61e3e97284c,Namespace:kube-system,Attempt:1,}" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.769 [INFO][4621] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.769 [INFO][4621] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" iface="eth0" netns="/var/run/netns/cni-dc57ed0c-c6f8-eb3b-e767-8b4ee0b90979" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.769 [INFO][4621] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" iface="eth0" netns="/var/run/netns/cni-dc57ed0c-c6f8-eb3b-e767-8b4ee0b90979" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.770 [INFO][4621] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" iface="eth0" netns="/var/run/netns/cni-dc57ed0c-c6f8-eb3b-e767-8b4ee0b90979" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.770 [INFO][4621] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.770 [INFO][4621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.845 [INFO][4632] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.846 [INFO][4632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.846 [INFO][4632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.859 [WARNING][4632] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.859 [INFO][4632] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.874 [INFO][4632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:42.879809 env[1228]: 2024-12-13 14:22:42.878 [INFO][4621] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:22:42.880864 env[1228]: time="2024-12-13T14:22:42.880810711Z" level=info msg="TearDown network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" successfully" Dec 13 14:22:42.881287 env[1228]: time="2024-12-13T14:22:42.880863925Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" returns successfully" Dec 13 14:22:42.883709 env[1228]: time="2024-12-13T14:22:42.883657468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-md22j,Uid:61cc0cc6-461a-431a-bfe1-2c1336d14ad2,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:22:42.944296 systemd[1]: run-containerd-runc-k8s.io-47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386-runc.NefOS7.mount: Deactivated successfully. Dec 13 14:22:42.944454 systemd[1]: run-netns-cni\x2d67bdda49\x2d0bb5\x2d2b56\x2dedc2\x2d4761ac475760.mount: Deactivated successfully. Dec 13 14:22:42.944559 systemd[1]: run-netns-cni\x2ddc57ed0c\x2dc6f8\x2deb3b\x2de767\x2d8b4ee0b90979.mount: Deactivated successfully. Dec 13 14:22:43.108137 systemd-networkd[1032]: vxlan.calico: Gained IPv6LL Dec 13 14:22:43.166054 systemd-networkd[1032]: cali7ec809a436c: Link UP Dec 13 14:22:43.176065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ec809a436c: link becomes ready Dec 13 14:22:43.177243 systemd-networkd[1032]: cali7ec809a436c: Gained carrier Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:42.997 [INFO][4641] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0 coredns-7db6d8ff4d- kube-system d5b37a5c-716e-4b9d-b163-b61e3e97284c 1061 0 2024-12-13 14:21:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal coredns-7db6d8ff4d-wmkdc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7ec809a436c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:42.997 [INFO][4641] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.077 [INFO][4665] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" HandleID="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.094 [INFO][4665] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" HandleID="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acd30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-wmkdc", "timestamp":"2024-12-13 14:22:43.077184574 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.094 [INFO][4665] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.095 [INFO][4665] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.095 [INFO][4665] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.097 [INFO][4665] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.106 [INFO][4665] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.116 [INFO][4665] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.120 [INFO][4665] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.123 [INFO][4665] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.123 [INFO][4665] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.126 [INFO][4665] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9 Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.133 [INFO][4665] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.142 [INFO][4665] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.132/26] block=192.168.3.128/26 handle="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.142 [INFO][4665] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.132/26] handle="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.142 [INFO][4665] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:43.209083 env[1228]: 2024-12-13 14:22:43.142 [INFO][4665] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.132/26] IPv6=[] ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" HandleID="k8s-pod-network.19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.149 [INFO][4641] cni-plugin/k8s.go 386: Populated endpoint ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d5b37a5c-716e-4b9d-b163-b61e3e97284c", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-wmkdc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ec809a436c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.149 [INFO][4641] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.132/32] ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.149 [INFO][4641] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ec809a436c ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.178 [INFO][4641] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.186 [INFO][4641] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d5b37a5c-716e-4b9d-b163-b61e3e97284c", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9", Pod:"coredns-7db6d8ff4d-wmkdc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ec809a436c", MAC:"16:b5:72:b0:2a:61", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:43.210348 env[1228]: 2024-12-13 14:22:43.207 [INFO][4641] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wmkdc" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:22:43.217503 systemd-networkd[1032]: cali3e5361611f2: Link UP Dec 13 14:22:43.226953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e5361611f2: link becomes ready Dec 13 14:22:43.228245 systemd-networkd[1032]: cali3e5361611f2: Gained carrier Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.023 [INFO][4653] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0 calico-apiserver-75bc9dcd5f- calico-apiserver 61cc0cc6-461a-431a-bfe1-2c1336d14ad2 1062 0 2024-12-13 14:21:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75bc9dcd5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal calico-apiserver-75bc9dcd5f-md22j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3e5361611f2 [] []}} ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.023 [INFO][4653] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.112 [INFO][4670] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" HandleID="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.139 [INFO][4670] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" HandleID="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000161160), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"calico-apiserver-75bc9dcd5f-md22j", "timestamp":"2024-12-13 14:22:43.112695964 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.139 [INFO][4670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.142 [INFO][4670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.142 [INFO][4670] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.147 [INFO][4670] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.158 [INFO][4670] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.169 [INFO][4670] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.173 [INFO][4670] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.176 [INFO][4670] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.176 [INFO][4670] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.179 [INFO][4670] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.190 [INFO][4670] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.209 [INFO][4670] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.133/26] block=192.168.3.128/26 handle="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.210 [INFO][4670] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.133/26] handle="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.210 [INFO][4670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:43.266512 env[1228]: 2024-12-13 14:22:43.210 [INFO][4670] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.133/26] IPv6=[] ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" HandleID="k8s-pod-network.68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.212 [INFO][4653] cni-plugin/k8s.go 386: Populated endpoint ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"61cc0cc6-461a-431a-bfe1-2c1336d14ad2", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-75bc9dcd5f-md22j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e5361611f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.213 [INFO][4653] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.133/32] ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.213 [INFO][4653] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e5361611f2 ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.234 [INFO][4653] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.236 [INFO][4653] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"61cc0cc6-461a-431a-bfe1-2c1336d14ad2", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c", Pod:"calico-apiserver-75bc9dcd5f-md22j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e5361611f2", MAC:"72:2f:cd:20:10:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:43.267876 env[1228]: 2024-12-13 14:22:43.264 [INFO][4653] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c" Namespace="calico-apiserver" Pod="calico-apiserver-75bc9dcd5f-md22j" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:22:43.269000 audit[4687]: NETFILTER_CFG table=filter:102 family=2 entries=46 op=nft_register_chain pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:43.276128 kernel: kauditd_printk_skb: 739 callbacks suppressed Dec 13 14:22:43.276221 kernel: audit: type=1325 audit(1734099763.269:1303): table=filter:102 family=2 entries=46 op=nft_register_chain pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:43.300239 systemd-networkd[1032]: cali5d9812959d1: Gained IPv6LL Dec 13 14:22:43.269000 audit[4687]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffd0ba47530 a2=0 a3=7ffd0ba4751c items=0 ppid=4199 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.335948 kernel: audit: type=1300 audit(1734099763.269:1303): arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffd0ba47530 a2=0 a3=7ffd0ba4751c items=0 ppid=4199 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.269000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:43.357020 kernel: audit: type=1327 audit(1734099763.269:1303): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:43.371694 env[1228]: time="2024-12-13T14:22:43.368524826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:43.372081 env[1228]: time="2024-12-13T14:22:43.371990235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:43.372393 env[1228]: time="2024-12-13T14:22:43.372308726Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:43.373742 env[1228]: time="2024-12-13T14:22:43.373676127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9 pid=4717 runtime=io.containerd.runc.v2 Dec 13 14:22:43.395298 env[1228]: time="2024-12-13T14:22:43.395198004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:43.396059 env[1228]: time="2024-12-13T14:22:43.395991524Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:43.396310 env[1228]: time="2024-12-13T14:22:43.396270339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:43.397250 env[1228]: time="2024-12-13T14:22:43.397198074Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c pid=4732 runtime=io.containerd.runc.v2 Dec 13 14:22:43.395000 audit[4731]: NETFILTER_CFG table=filter:103 family=2 entries=46 op=nft_register_chain pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:43.413997 kernel: audit: type=1325 audit(1734099763.395:1304): table=filter:103 family=2 entries=46 op=nft_register_chain pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:43.395000 audit[4731]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffc9f1ae4b0 a2=0 a3=7ffc9f1ae49c items=0 ppid=4199 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.439319 systemd[1]: Started cri-containerd-19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9.scope. Dec 13 14:22:43.474052 kernel: audit: type=1300 audit(1734099763.395:1304): arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffc9f1ae4b0 a2=0 a3=7ffc9f1ae49c items=0 ppid=4199 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.395000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:43.496458 kernel: audit: type=1327 audit(1734099763.395:1304): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:43.523231 systemd[1]: Started cri-containerd-68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c.scope. Dec 13 14:22:43.552083 kernel: audit: type=1400 audit(1734099763.530:1305): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.574927 kernel: audit: type=1400 audit(1734099763.530:1306): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597927 kernel: audit: type=1400 audit(1734099763.530:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.636825 kernel: audit: type=1400 audit(1734099763.530:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.596000 audit: BPF prog-id=192 op=LOAD Dec 13 14:22:43.596000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.596000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4717 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623165396330323962373861383461666336396235666630356131 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4717 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623165396330323962373861383461666336396235666630356131 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit: BPF prog-id=193 op=LOAD Dec 13 14:22:43.597000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000310cd0 items=0 ppid=4717 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623165396330323962373861383461666336396235666630356131 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit: BPF prog-id=194 op=LOAD Dec 13 14:22:43.597000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000310d18 items=0 ppid=4717 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623165396330323962373861383461666336396235666630356131 Dec 13 14:22:43.597000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:22:43.597000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.597000 audit: BPF prog-id=195 op=LOAD Dec 13 14:22:43.597000 audit[4733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000311128 items=0 ppid=4717 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623165396330323962373861383461666336396235666630356131 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.655000 audit: BPF prog-id=196 op=LOAD Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4732 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638393939623464326231613563633461663431343565346435393930 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4732 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638393939623464326231613563633461663431343565346435393930 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit: BPF prog-id=197 op=LOAD Dec 13 14:22:43.656000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc9c0 items=0 ppid=4732 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638393939623464326231613563633461663431343565346435393930 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit: BPF prog-id=198 op=LOAD Dec 13 14:22:43.656000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dca08 items=0 ppid=4732 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638393939623464326231613563633461663431343565346435393930 Dec 13 14:22:43.656000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:22:43.656000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.656000 audit: BPF prog-id=199 op=LOAD Dec 13 14:22:43.656000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dce18 items=0 ppid=4732 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638393939623464326231613563633461663431343565346435393930 Dec 13 14:22:43.684691 env[1228]: time="2024-12-13T14:22:43.684635393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wmkdc,Uid:d5b37a5c-716e-4b9d-b163-b61e3e97284c,Namespace:kube-system,Attempt:1,} returns sandbox id \"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9\"" Dec 13 14:22:43.689785 env[1228]: time="2024-12-13T14:22:43.689735244Z" level=info msg="CreateContainer within sandbox \"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:22:43.714206 env[1228]: time="2024-12-13T14:22:43.714142835Z" level=info msg="CreateContainer within sandbox \"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8131218f954040b65af3945a2d93bc054729506537cbfb00da27e6b284de81d8\"" Dec 13 14:22:43.717141 env[1228]: time="2024-12-13T14:22:43.715200470Z" level=info msg="StartContainer for \"8131218f954040b65af3945a2d93bc054729506537cbfb00da27e6b284de81d8\"" Dec 13 14:22:43.727527 env[1228]: time="2024-12-13T14:22:43.727454975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75bc9dcd5f-md22j,Uid:61cc0cc6-461a-431a-bfe1-2c1336d14ad2,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c\"" Dec 13 14:22:43.759034 systemd[1]: Started cri-containerd-8131218f954040b65af3945a2d93bc054729506537cbfb00da27e6b284de81d8.scope. Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.790000 audit: BPF prog-id=200 op=LOAD Dec 13 14:22:43.790000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.790000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4717 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333132313866393534303430623635616633393435613264393362 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4717 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333132313866393534303430623635616633393435613264393362 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit: BPF prog-id=201 op=LOAD Dec 13 14:22:43.791000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028f300 items=0 ppid=4717 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333132313866393534303430623635616633393435613264393362 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit: BPF prog-id=202 op=LOAD Dec 13 14:22:43.791000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028f348 items=0 ppid=4717 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333132313866393534303430623635616633393435613264393362 Dec 13 14:22:43.791000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:22:43.791000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:43.791000 audit: BPF prog-id=203 op=LOAD Dec 13 14:22:43.791000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00028f758 items=0 ppid=4717 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:43.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333132313866393534303430623635616633393435613264393362 Dec 13 14:22:43.822834 env[1228]: time="2024-12-13T14:22:43.822770407Z" level=info msg="StartContainer for \"8131218f954040b65af3945a2d93bc054729506537cbfb00da27e6b284de81d8\" returns successfully" Dec 13 14:22:43.940702 systemd[1]: run-containerd-runc-k8s.io-68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c-runc.MU9LkA.mount: Deactivated successfully. Dec 13 14:22:44.032468 kubelet[2112]: I1213 14:22:44.032392 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-wmkdc" podStartSLOduration=76.032366136 podStartE2EDuration="1m16.032366136s" podCreationTimestamp="2024-12-13 14:21:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:44.029524886 +0000 UTC m=+91.616578355" watchObservedRunningTime="2024-12-13 14:22:44.032366136 +0000 UTC m=+91.619419599" Dec 13 14:22:44.090000 audit[4831]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=4831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.090000 audit[4831]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffebfa61990 a2=0 a3=7ffebfa6197c items=0 ppid=2316 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.095000 audit[4831]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.095000 audit[4831]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffebfa61990 a2=0 a3=0 items=0 ppid=2316 pid=4831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.112000 audit[4833]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.112000 audit[4833]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd1f593930 a2=0 a3=7ffd1f59391c items=0 ppid=2316 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.118000 audit[4833]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:44.118000 audit[4833]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd1f593930 a2=0 a3=7ffd1f59391c items=0 ppid=2316 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:44.132252 systemd-networkd[1032]: caliec7a3822b35: Gained IPv6LL Dec 13 14:22:44.288001 env[1228]: time="2024-12-13T14:22:44.287027505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:44.291876 env[1228]: time="2024-12-13T14:22:44.291822732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:44.295411 env[1228]: time="2024-12-13T14:22:44.295323606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:44.298448 env[1228]: time="2024-12-13T14:22:44.298388100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:44.299407 env[1228]: time="2024-12-13T14:22:44.299341789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:22:44.304283 env[1228]: time="2024-12-13T14:22:44.304215193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:22:44.306733 env[1228]: time="2024-12-13T14:22:44.306679499Z" level=info msg="CreateContainer within sandbox \"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:22:44.336140 env[1228]: time="2024-12-13T14:22:44.336058710Z" level=info msg="CreateContainer within sandbox \"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5e26a123eed4a5d1874766f78f88c243f384a4804887f74497edcf27b7fa7fc2\"" Dec 13 14:22:44.338462 env[1228]: time="2024-12-13T14:22:44.337120159Z" level=info msg="StartContainer for \"5e26a123eed4a5d1874766f78f88c243f384a4804887f74497edcf27b7fa7fc2\"" Dec 13 14:22:44.372539 systemd[1]: Started cri-containerd-5e26a123eed4a5d1874766f78f88c243f384a4804887f74497edcf27b7fa7fc2.scope. Dec 13 14:22:44.388297 systemd[1]: run-containerd-runc-k8s.io-5e26a123eed4a5d1874766f78f88c243f384a4804887f74497edcf27b7fa7fc2-runc.rk7CHM.mount: Deactivated successfully. Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.414000 audit: BPF prog-id=204 op=LOAD Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4154 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323661313233656564346135643138373437363666373866383863 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4154 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323661313233656564346135643138373437363666373866383863 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit: BPF prog-id=205 op=LOAD Dec 13 14:22:44.415000 audit[4843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2410 items=0 ppid=4154 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323661313233656564346135643138373437363666373866383863 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit: BPF prog-id=206 op=LOAD Dec 13 14:22:44.415000 audit[4843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d2458 items=0 ppid=4154 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323661313233656564346135643138373437363666373866383863 Dec 13 14:22:44.415000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:22:44.415000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { perfmon } for pid=4843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit[4843]: AVC avc: denied { bpf } for pid=4843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:44.415000 audit: BPF prog-id=207 op=LOAD Dec 13 14:22:44.415000 audit[4843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2868 items=0 ppid=4154 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323661313233656564346135643138373437363666373866383863 Dec 13 14:22:44.466649 env[1228]: time="2024-12-13T14:22:44.466542953Z" level=info msg="StartContainer for \"5e26a123eed4a5d1874766f78f88c243f384a4804887f74497edcf27b7fa7fc2\" returns successfully" Dec 13 14:22:44.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.72:22-139.178.68.195:43982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:44.502157 systemd[1]: Started sshd@15-10.128.0.72:22-139.178.68.195:43982.service. Dec 13 14:22:44.568951 env[1228]: time="2024-12-13T14:22:44.568767272Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:22:44.580099 systemd-networkd[1032]: cali3e5361611f2: Gained IPv6LL Dec 13 14:22:44.644649 systemd-networkd[1032]: cali7ec809a436c: Gained IPv6LL Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.669 [INFO][4890] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.670 [INFO][4890] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" iface="eth0" netns="/var/run/netns/cni-f0622147-6663-e8b0-aa9c-57b7a8fd4cd3" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.670 [INFO][4890] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" iface="eth0" netns="/var/run/netns/cni-f0622147-6663-e8b0-aa9c-57b7a8fd4cd3" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.670 [INFO][4890] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" iface="eth0" netns="/var/run/netns/cni-f0622147-6663-e8b0-aa9c-57b7a8fd4cd3" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.670 [INFO][4890] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.670 [INFO][4890] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.723 [INFO][4897] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.723 [INFO][4897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.724 [INFO][4897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.738 [WARNING][4897] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.738 [INFO][4897] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.740 [INFO][4897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:44.744196 env[1228]: 2024-12-13 14:22:44.742 [INFO][4890] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:22:44.746335 env[1228]: time="2024-12-13T14:22:44.745619578Z" level=info msg="TearDown network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" successfully" Dec 13 14:22:44.746335 env[1228]: time="2024-12-13T14:22:44.745682940Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" returns successfully" Dec 13 14:22:44.747591 env[1228]: time="2024-12-13T14:22:44.746895325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdjqf,Uid:d45d4b8c-22c2-416b-b434-328c539f2fe5,Namespace:kube-system,Attempt:1,}" Dec 13 14:22:44.842000 audit[4873]: USER_ACCT pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:44.846411 sshd[4873]: Accepted publickey for core from 139.178.68.195 port 43982 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:44.849000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:44.851000 audit[4873]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebfdbf170 a2=3 a3=0 items=0 ppid=1 pid=4873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:44.851000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:44.853192 sshd[4873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:44.866446 systemd[1]: Started session-16.scope. Dec 13 14:22:44.868257 systemd-logind[1240]: New session 16 of user core. Dec 13 14:22:44.881000 audit[4873]: USER_START pid=4873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:44.884000 audit[4915]: CRED_ACQ pid=4915 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:44.941673 systemd[1]: run-netns-cni\x2df0622147\x2d6663\x2de8b0\x2daa9c\x2d57b7a8fd4cd3.mount: Deactivated successfully. Dec 13 14:22:45.147306 systemd-networkd[1032]: calia2c5010aa00: Link UP Dec 13 14:22:45.161151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:22:45.170016 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia2c5010aa00: link becomes ready Dec 13 14:22:45.180712 systemd-networkd[1032]: calia2c5010aa00: Gained carrier Dec 13 14:22:45.206000 audit[4932]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:45.206000 audit[4932]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd898e3510 a2=0 a3=7ffd898e34fc items=0 ppid=2316 pid=4932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:45.215921 kubelet[2112]: I1213 14:22:45.213815 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-zskrp" podStartSLOduration=65.392127327 podStartE2EDuration="1m10.213790385s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:22:39.479988903 +0000 UTC m=+87.067042360" lastFinishedPulling="2024-12-13 14:22:44.301651956 +0000 UTC m=+91.888705418" observedRunningTime="2024-12-13 14:22:45.11283562 +0000 UTC m=+92.699889087" watchObservedRunningTime="2024-12-13 14:22:45.213790385 +0000 UTC m=+92.800843854" Dec 13 14:22:45.233000 audit[4932]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4932 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:45.233000 audit[4932]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd898e3510 a2=0 a3=7ffd898e34fc items=0 ppid=2316 pid=4932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.872 [INFO][4904] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0 coredns-7db6d8ff4d- kube-system d45d4b8c-22c2-416b-b434-328c539f2fe5 1089 0 2024-12-13 14:21:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal coredns-7db6d8ff4d-pdjqf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia2c5010aa00 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.875 [INFO][4904] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.974 [INFO][4916] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" HandleID="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.996 [INFO][4916] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" HandleID="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334e00), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", "pod":"coredns-7db6d8ff4d-pdjqf", "timestamp":"2024-12-13 14:22:44.97441418 +0000 UTC"}, Hostname:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.996 [INFO][4916] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.996 [INFO][4916] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:44.996 [INFO][4916] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal' Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.000 [INFO][4916] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.007 [INFO][4916] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.026 [INFO][4916] ipam/ipam.go 489: Trying affinity for 192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.029 [INFO][4916] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.034 [INFO][4916] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.128/26 host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.035 [INFO][4916] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.128/26 handle="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.057 [INFO][4916] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75 Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.074 [INFO][4916] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.128/26 handle="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.137 [INFO][4916] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.134/26] block=192.168.3.128/26 handle="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.137 [INFO][4916] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.134/26] handle="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" host="ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal" Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.137 [INFO][4916] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:22:45.241995 env[1228]: 2024-12-13 14:22:45.137 [INFO][4916] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.134/26] IPv6=[] ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" HandleID="k8s-pod-network.e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.139 [INFO][4904] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d45d4b8c-22c2-416b-b434-328c539f2fe5", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-7db6d8ff4d-pdjqf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2c5010aa00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.140 [INFO][4904] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.134/32] ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.140 [INFO][4904] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia2c5010aa00 ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.184 [INFO][4904] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.185 [INFO][4904] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d45d4b8c-22c2-416b-b434-328c539f2fe5", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75", Pod:"coredns-7db6d8ff4d-pdjqf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2c5010aa00", MAC:"9e:4d:55:58:9f:00", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:22:45.243260 env[1228]: 2024-12-13 14:22:45.212 [INFO][4904] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75" Namespace="kube-system" Pod="coredns-7db6d8ff4d-pdjqf" WorkloadEndpoint="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:22:45.277025 sshd[4873]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:45.277000 audit[4873]: USER_END pid=4873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:45.278000 audit[4873]: CRED_DISP pid=4873 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:45.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.72:22-139.178.68.195:43982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:45.281537 systemd[1]: sshd@15-10.128.0.72:22-139.178.68.195:43982.service: Deactivated successfully. Dec 13 14:22:45.282778 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:22:45.287364 systemd-logind[1240]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:22:45.288649 systemd-logind[1240]: Removed session 16. Dec 13 14:22:45.316659 env[1228]: time="2024-12-13T14:22:45.316574354Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:22:45.316977 env[1228]: time="2024-12-13T14:22:45.316939384Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:22:45.317162 env[1228]: time="2024-12-13T14:22:45.317129348Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:22:45.317557 env[1228]: time="2024-12-13T14:22:45.317506124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75 pid=4951 runtime=io.containerd.runc.v2 Dec 13 14:22:45.319000 audit[4953]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:22:45.319000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffeb2708460 a2=0 a3=7ffeb270844c items=0 ppid=4199 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:22:45.380498 systemd[1]: Started cri-containerd-e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75.scope. Dec 13 14:22:45.405140 systemd[1]: run-containerd-runc-k8s.io-e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75-runc.AzC8iq.mount: Deactivated successfully. Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.433000 audit: BPF prog-id=208 op=LOAD Dec 13 14:22:45.436000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.436000 audit[4963]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4951 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531313239316638656163313032623430363032383638626333653537 Dec 13 14:22:45.436000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.436000 audit[4963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4951 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531313239316638656163313032623430363032383638626333653537 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.437000 audit: BPF prog-id=209 op=LOAD Dec 13 14:22:45.437000 audit[4963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a3a70 items=0 ppid=4951 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531313239316638656163313032623430363032383638626333653537 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.439000 audit: BPF prog-id=210 op=LOAD Dec 13 14:22:45.439000 audit[4963]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a3ab8 items=0 ppid=4951 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531313239316638656163313032623430363032383638626333653537 Dec 13 14:22:45.440000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:22:45.440000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { perfmon } for pid=4963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit[4963]: AVC avc: denied { bpf } for pid=4963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.440000 audit: BPF prog-id=211 op=LOAD Dec 13 14:22:45.440000 audit[4963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a3ec8 items=0 ppid=4951 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531313239316638656163313032623430363032383638626333653537 Dec 13 14:22:45.517832 env[1228]: time="2024-12-13T14:22:45.517755439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-pdjqf,Uid:d45d4b8c-22c2-416b-b434-328c539f2fe5,Namespace:kube-system,Attempt:1,} returns sandbox id \"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75\"" Dec 13 14:22:45.522663 env[1228]: time="2024-12-13T14:22:45.522577218Z" level=info msg="CreateContainer within sandbox \"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:22:45.554903 env[1228]: time="2024-12-13T14:22:45.554823569Z" level=info msg="CreateContainer within sandbox \"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0bea477947d241bee062e38cfb393995b950c71768eeca726278484d91677212\"" Dec 13 14:22:45.556059 env[1228]: time="2024-12-13T14:22:45.556013833Z" level=info msg="StartContainer for \"0bea477947d241bee062e38cfb393995b950c71768eeca726278484d91677212\"" Dec 13 14:22:45.606813 systemd[1]: Started cri-containerd-0bea477947d241bee062e38cfb393995b950c71768eeca726278484d91677212.scope. Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.647000 audit: BPF prog-id=212 op=LOAD Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4951 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656134373739343764323431626565303632653338636662333933 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4951 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656134373739343764323431626565303632653338636662333933 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.648000 audit: BPF prog-id=213 op=LOAD Dec 13 14:22:45.648000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025380 items=0 ppid=4951 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656134373739343764323431626565303632653338636662333933 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit: BPF prog-id=214 op=LOAD Dec 13 14:22:45.649000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000253c8 items=0 ppid=4951 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656134373739343764323431626565303632653338636662333933 Dec 13 14:22:45.649000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:22:45.649000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:45.649000 audit: BPF prog-id=215 op=LOAD Dec 13 14:22:45.649000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000257d8 items=0 ppid=4951 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:45.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656134373739343764323431626565303632653338636662333933 Dec 13 14:22:45.716744 env[1228]: time="2024-12-13T14:22:45.716664954Z" level=info msg="StartContainer for \"0bea477947d241bee062e38cfb393995b950c71768eeca726278484d91677212\" returns successfully" Dec 13 14:22:46.065492 kubelet[2112]: I1213 14:22:46.064941 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-pdjqf" podStartSLOduration=78.064918085 podStartE2EDuration="1m18.064918085s" podCreationTimestamp="2024-12-13 14:21:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:22:46.06317543 +0000 UTC m=+93.650228897" watchObservedRunningTime="2024-12-13 14:22:46.064918085 +0000 UTC m=+93.651971554" Dec 13 14:22:46.184000 audit[5024]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=5024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.184000 audit[5024]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdc43017e0 a2=0 a3=7ffdc43017cc items=0 ppid=2316 pid=5024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:46.240000 audit[5024]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=5024 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:46.240000 audit[5024]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdc43017e0 a2=0 a3=7ffdc43017cc items=0 ppid=2316 pid=5024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:46.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:47.036201 kubelet[2112]: I1213 14:22:47.036157 2112 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:22:47.076063 systemd-networkd[1032]: calia2c5010aa00: Gained IPv6LL Dec 13 14:22:47.300000 audit[5026]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:47.300000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd841fd580 a2=0 a3=7ffd841fd56c items=0 ppid=2316 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:47.311332 env[1228]: time="2024-12-13T14:22:47.311257337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:47.314487 env[1228]: time="2024-12-13T14:22:47.314434663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:47.317317 env[1228]: time="2024-12-13T14:22:47.317254507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:47.319986 env[1228]: time="2024-12-13T14:22:47.319940314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:47.321026 env[1228]: time="2024-12-13T14:22:47.320982400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:22:47.329419 env[1228]: time="2024-12-13T14:22:47.329365787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:22:47.341000 audit[5026]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=5026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:47.341000 audit[5026]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd841fd580 a2=0 a3=7ffd841fd56c items=0 ppid=2316 pid=5026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:47.357454 env[1228]: time="2024-12-13T14:22:47.357401335Z" level=info msg="CreateContainer within sandbox \"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:22:47.383058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1026934830.mount: Deactivated successfully. Dec 13 14:22:47.390919 env[1228]: time="2024-12-13T14:22:47.390105840Z" level=info msg="CreateContainer within sandbox \"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854\"" Dec 13 14:22:47.393568 env[1228]: time="2024-12-13T14:22:47.393508463Z" level=info msg="StartContainer for \"c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854\"" Dec 13 14:22:47.457835 systemd[1]: Started cri-containerd-c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854.scope. Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.491000 audit: BPF prog-id=216 op=LOAD Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4389 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396434356230356330646137353666666364656435396465343735 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4389 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396434356230356330646137353666666364656435396465343735 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit: BPF prog-id=217 op=LOAD Dec 13 14:22:47.493000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035cc70 items=0 ppid=4389 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396434356230356330646137353666666364656435396465343735 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit: BPF prog-id=218 op=LOAD Dec 13 14:22:47.493000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035ccb8 items=0 ppid=4389 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396434356230356330646137353666666364656435396465343735 Dec 13 14:22:47.493000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:22:47.493000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:47.493000 audit: BPF prog-id=219 op=LOAD Dec 13 14:22:47.493000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035d0c8 items=0 ppid=4389 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:47.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396434356230356330646137353666666364656435396465343735 Dec 13 14:22:47.551799 env[1228]: time="2024-12-13T14:22:47.551731171Z" level=info msg="StartContainer for \"c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854\" returns successfully" Dec 13 14:22:47.611000 audit[4856]: AVC avc: denied { watch } for pid=4856 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_21_47.3621230113/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c619,c903 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c619,c903 tclass=file permissive=0 Dec 13 14:22:47.611000 audit[4856]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b725e0 a2=fc6 a3=0 items=0 ppid=4154 pid=4856 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c619,c903 key=(null) Dec 13 14:22:47.611000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:22:48.064157 kubelet[2112]: I1213 14:22:48.063029 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5bd4dcdc94-f8666" podStartSLOduration=67.374750838 podStartE2EDuration="1m13.062967042s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:22:41.636048028 +0000 UTC m=+89.223101482" lastFinishedPulling="2024-12-13 14:22:47.324264226 +0000 UTC m=+94.911317686" observedRunningTime="2024-12-13 14:22:48.059971185 +0000 UTC m=+95.647024652" watchObservedRunningTime="2024-12-13 14:22:48.062967042 +0000 UTC m=+95.650020508" Dec 13 14:22:48.365000 audit[5091]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.372777 kernel: kauditd_printk_skb: 442 callbacks suppressed Dec 13 14:22:48.372923 kernel: audit: type=1325 audit(1734099768.365:1452): table=filter:115 family=2 entries=9 op=nft_register_rule pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.365000 audit[5091]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc5f505c10 a2=0 a3=7ffc5f505bfc items=0 ppid=2316 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.422353 kernel: audit: type=1300 audit(1734099768.365:1452): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc5f505c10 a2=0 a3=7ffc5f505bfc items=0 ppid=2316 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:48.438881 kernel: audit: type=1327 audit(1734099768.365:1452): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:48.439048 kernel: audit: type=1325 audit(1734099768.421:1453): table=nat:116 family=2 entries=27 op=nft_register_chain pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.421000 audit[5091]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:48.421000 audit[5091]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc5f505c10 a2=0 a3=7ffc5f505bfc items=0 ppid=2316 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.489135 kernel: audit: type=1300 audit(1734099768.421:1453): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc5f505c10 a2=0 a3=7ffc5f505bfc items=0 ppid=2316 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:48.489345 kernel: audit: type=1327 audit(1734099768.421:1453): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:48.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:49.049996 env[1228]: time="2024-12-13T14:22:49.049918936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.053841 env[1228]: time="2024-12-13T14:22:49.053792735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.061206 env[1228]: time="2024-12-13T14:22:49.061151294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.066056 env[1228]: time="2024-12-13T14:22:49.065999767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.067562 env[1228]: time="2024-12-13T14:22:49.067504005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:22:49.071342 env[1228]: time="2024-12-13T14:22:49.071296778Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:22:49.075327 env[1228]: time="2024-12-13T14:22:49.075271050Z" level=info msg="CreateContainer within sandbox \"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:22:49.112569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2657276516.mount: Deactivated successfully. Dec 13 14:22:49.122226 env[1228]: time="2024-12-13T14:22:49.122156741Z" level=info msg="CreateContainer within sandbox \"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4912fa3bc9ce3b70f6065a3bef946e09423150261486b96df30ce42981a51ac2\"" Dec 13 14:22:49.123561 env[1228]: time="2024-12-13T14:22:49.123507184Z" level=info msg="StartContainer for \"4912fa3bc9ce3b70f6065a3bef946e09423150261486b96df30ce42981a51ac2\"" Dec 13 14:22:49.183241 systemd[1]: Started cri-containerd-4912fa3bc9ce3b70f6065a3bef946e09423150261486b96df30ce42981a51ac2.scope. Dec 13 14:22:49.220000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243030 kernel: audit: type=1400 audit(1734099769.220:1454): avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.220000 audit[5100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9a3fe42078 items=0 ppid=4536 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.279935 kernel: audit: type=1300 audit(1734099769.220:1454): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9a3fe42078 items=0 ppid=4536 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313266613362633963653362373066363036356133626566393436 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.331082 kernel: audit: type=1327 audit(1734099769.220:1454): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313266613362633963653362373066363036356133626566393436 Dec 13 14:22:49.331241 kernel: audit: type=1400 audit(1734099769.242:1455): avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.339487 systemd[1]: run-containerd-runc-k8s.io-4912fa3bc9ce3b70f6065a3bef946e09423150261486b96df30ce42981a51ac2-runc.XgUNnZ.mount: Deactivated successfully. Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit: BPF prog-id=220 op=LOAD Dec 13 14:22:49.242000 audit[5100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d7f58 items=0 ppid=4536 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313266613362633963653362373066363036356133626566393436 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.242000 audit: BPF prog-id=221 op=LOAD Dec 13 14:22:49.242000 audit[5100]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d7fa8 items=0 ppid=4536 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313266613362633963653362373066363036356133626566393436 Dec 13 14:22:49.243000 audit: BPF prog-id=221 op=UNLOAD Dec 13 14:22:49.243000 audit: BPF prog-id=220 op=UNLOAD Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { perfmon } for pid=5100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit[5100]: AVC avc: denied { bpf } for pid=5100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.243000 audit: BPF prog-id=222 op=LOAD Dec 13 14:22:49.243000 audit[5100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00034a038 items=0 ppid=4536 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439313266613362633963653362373066363036356133626566393436 Dec 13 14:22:49.354122 env[1228]: time="2024-12-13T14:22:49.354062173Z" level=info msg="StartContainer for \"4912fa3bc9ce3b70f6065a3bef946e09423150261486b96df30ce42981a51ac2\" returns successfully" Dec 13 14:22:49.400019 env[1228]: time="2024-12-13T14:22:49.399877590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.403410 env[1228]: time="2024-12-13T14:22:49.403361886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.413431 env[1228]: time="2024-12-13T14:22:49.413367566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.419934 env[1228]: time="2024-12-13T14:22:49.419863150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:49.420838 env[1228]: time="2024-12-13T14:22:49.420790450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:22:49.424535 env[1228]: time="2024-12-13T14:22:49.424492096Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:22:49.426263 env[1228]: time="2024-12-13T14:22:49.426217612Z" level=info msg="CreateContainer within sandbox \"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:22:49.452970 env[1228]: time="2024-12-13T14:22:49.452909021Z" level=info msg="CreateContainer within sandbox \"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e941f6d9639e2a3e547ba633c2ec0100f0a5d0bb4d6ed4abdd9ee06a9cb6e54b\"" Dec 13 14:22:49.454530 env[1228]: time="2024-12-13T14:22:49.454485085Z" level=info msg="StartContainer for \"e941f6d9639e2a3e547ba633c2ec0100f0a5d0bb4d6ed4abdd9ee06a9cb6e54b\"" Dec 13 14:22:49.498258 systemd[1]: Started cri-containerd-e941f6d9639e2a3e547ba633c2ec0100f0a5d0bb4d6ed4abdd9ee06a9cb6e54b.scope. Dec 13 14:22:49.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.554000 audit: BPF prog-id=223 op=LOAD Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4732 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343166366439363339653261336535343762613633336332656330 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4732 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343166366439363339653261336535343762613633336332656330 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.555000 audit: BPF prog-id=224 op=LOAD Dec 13 14:22:49.555000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257d00 items=0 ppid=4732 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343166366439363339653261336535343762613633336332656330 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.556000 audit: BPF prog-id=225 op=LOAD Dec 13 14:22:49.556000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d48 items=0 ppid=4732 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343166366439363339653261336535343762613633336332656330 Dec 13 14:22:49.558000 audit: BPF prog-id=225 op=UNLOAD Dec 13 14:22:49.558000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:49.558000 audit: BPF prog-id=226 op=LOAD Dec 13 14:22:49.558000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0158 items=0 ppid=4732 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:49.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343166366439363339653261336535343762613633336332656330 Dec 13 14:22:49.646834 env[1228]: time="2024-12-13T14:22:49.646687609Z" level=info msg="StartContainer for \"e941f6d9639e2a3e547ba633c2ec0100f0a5d0bb4d6ed4abdd9ee06a9cb6e54b\" returns successfully" Dec 13 14:22:50.101000 audit[5166]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.101000 audit[5166]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe9ba78750 a2=0 a3=7ffe9ba7873c items=0 ppid=2316 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.107000 audit[5166]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=5166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.107000 audit[5166]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe9ba78750 a2=0 a3=7ffe9ba7873c items=0 ppid=2316 pid=5166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.72:22-139.178.68.195:46844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:50.329074 systemd[1]: Started sshd@16-10.128.0.72:22-139.178.68.195:46844.service. Dec 13 14:22:50.339647 systemd[1]: run-containerd-runc-k8s.io-e941f6d9639e2a3e547ba633c2ec0100f0a5d0bb4d6ed4abdd9ee06a9cb6e54b-runc.9JOrRD.mount: Deactivated successfully. Dec 13 14:22:50.574000 audit[5146]: AVC avc: denied { watch } for pid=5146 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_21_47.1846653592/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c459,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c459,c861 tclass=file permissive=0 Dec 13 14:22:50.574000 audit[5146]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00158c0a0 a2=fc6 a3=0 items=0 ppid=4732 pid=5146 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c459,c861 key=(null) Dec 13 14:22:50.574000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:22:50.610720 kubelet[2112]: I1213 14:22:50.610626 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75bc9dcd5f-md22j" podStartSLOduration=69.916762008 podStartE2EDuration="1m15.610597177s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:22:43.729413178 +0000 UTC m=+91.316466623" lastFinishedPulling="2024-12-13 14:22:49.423248343 +0000 UTC m=+97.010301792" observedRunningTime="2024-12-13 14:22:50.072598353 +0000 UTC m=+97.659651823" watchObservedRunningTime="2024-12-13 14:22:50.610597177 +0000 UTC m=+98.197650645" Dec 13 14:22:50.638000 audit[5168]: USER_ACCT pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.641845 sshd[5168]: Accepted publickey for core from 139.178.68.195 port 46844 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:50.641000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.645000 audit[5168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe92aea400 a2=3 a3=0 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:50.647751 sshd[5168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:50.657636 systemd[1]: Started session-17.scope. Dec 13 14:22:50.658580 systemd-logind[1240]: New session 17 of user core. Dec 13 14:22:50.667000 audit[5168]: USER_START pid=5168 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.671000 audit[5173]: CRED_ACQ pid=5173 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.697000 audit[5174]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.697000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe2e83da80 a2=0 a3=7ffe2e83da6c items=0 ppid=2316 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.704000 audit[5174]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:50.704000 audit[5174]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe2e83da80 a2=0 a3=7ffe2e83da6c items=0 ppid=2316 pid=5174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:50.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:50.987079 sshd[5168]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:50.990000 audit[5168]: USER_END pid=5168 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.990000 audit[5168]: CRED_DISP pid=5168 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:50.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.72:22-139.178.68.195:46844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:50.994110 systemd[1]: sshd@16-10.128.0.72:22-139.178.68.195:46844.service: Deactivated successfully. Dec 13 14:22:50.995297 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:22:50.997140 systemd-logind[1240]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:22:50.998709 systemd-logind[1240]: Removed session 17. Dec 13 14:22:51.004795 env[1228]: time="2024-12-13T14:22:51.004725802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:51.008176 env[1228]: time="2024-12-13T14:22:51.008130397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:51.010878 env[1228]: time="2024-12-13T14:22:51.010827722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:51.013519 env[1228]: time="2024-12-13T14:22:51.013478268Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:22:51.014320 env[1228]: time="2024-12-13T14:22:51.014265732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:22:51.018117 env[1228]: time="2024-12-13T14:22:51.018074165Z" level=info msg="CreateContainer within sandbox \"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:22:51.043952 env[1228]: time="2024-12-13T14:22:51.043821830Z" level=info msg="CreateContainer within sandbox \"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b8314b1d3623d64467c57ca81e86a67caf1f3f23826018f2af06acf604949985\"" Dec 13 14:22:51.046645 env[1228]: time="2024-12-13T14:22:51.045451319Z" level=info msg="StartContainer for \"b8314b1d3623d64467c57ca81e86a67caf1f3f23826018f2af06acf604949985\"" Dec 13 14:22:51.096574 systemd[1]: Started cri-containerd-b8314b1d3623d64467c57ca81e86a67caf1f3f23826018f2af06acf604949985.scope. Dec 13 14:22:51.118000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.118000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5e6e7c0cc8 items=0 ppid=4536 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333134623164333632336436343436376335376361383165383661 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.119000 audit: BPF prog-id=227 op=LOAD Dec 13 14:22:51.119000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000304988 items=0 ppid=4536 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333134623164333632336436343436376335376361383165383661 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.121000 audit: BPF prog-id=228 op=LOAD Dec 13 14:22:51.121000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003049d8 items=0 ppid=4536 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333134623164333632336436343436376335376361383165383661 Dec 13 14:22:51.123000 audit: BPF prog-id=228 op=UNLOAD Dec 13 14:22:51.123000 audit: BPF prog-id=227 op=UNLOAD Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { perfmon } for pid=5190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit[5190]: AVC avc: denied { bpf } for pid=5190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:22:51.123000 audit: BPF prog-id=229 op=LOAD Dec 13 14:22:51.123000 audit[5190]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000304a68 items=0 ppid=4536 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:51.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333134623164333632336436343436376335376361383165383661 Dec 13 14:22:51.149675 env[1228]: time="2024-12-13T14:22:51.149617206Z" level=info msg="StartContainer for \"b8314b1d3623d64467c57ca81e86a67caf1f3f23826018f2af06acf604949985\" returns successfully" Dec 13 14:22:51.719661 kubelet[2112]: I1213 14:22:51.719589 2112 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:22:51.719661 kubelet[2112]: I1213 14:22:51.719657 2112 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:22:56.034572 systemd[1]: Started sshd@17-10.128.0.72:22-139.178.68.195:46854.service. Dec 13 14:22:56.066552 kernel: kauditd_printk_skb: 165 callbacks suppressed Dec 13 14:22:56.066738 kernel: audit: type=1130 audit(1734099776.034:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.72:22-139.178.68.195:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:56.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.72:22-139.178.68.195:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:56.327000 audit[5231]: USER_ACCT pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.330546 sshd[5231]: Accepted publickey for core from 139.178.68.195 port 46854 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:22:56.357000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.387538 kernel: audit: type=1101 audit(1734099776.327:1499): pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.387629 kernel: audit: type=1103 audit(1734099776.357:1500): pid=5231 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.387674 kernel: audit: type=1006 audit(1734099776.357:1501): pid=5231 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:22:56.359423 sshd[5231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:56.373976 systemd-logind[1240]: New session 18 of user core. Dec 13 14:22:56.376265 systemd[1]: Started session-18.scope. Dec 13 14:22:56.357000 audit[5231]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7759b7e0 a2=3 a3=0 items=0 ppid=1 pid=5231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:56.402934 kernel: audit: type=1300 audit(1734099776.357:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7759b7e0 a2=3 a3=0 items=0 ppid=1 pid=5231 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:56.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:56.431014 kernel: audit: type=1327 audit(1734099776.357:1501): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:56.384000 audit[5231]: USER_START pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.473110 kernel: audit: type=1105 audit(1734099776.384:1502): pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.389000 audit[5233]: CRED_ACQ pid=5233 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.497552 kernel: audit: type=1103 audit(1734099776.389:1503): pid=5233 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.666399 sshd[5231]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:56.667000 audit[5231]: USER_END pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.673039 systemd[1]: sshd@17-10.128.0.72:22-139.178.68.195:46854.service: Deactivated successfully. Dec 13 14:22:56.674284 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:22:56.676697 systemd-logind[1240]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:22:56.678305 systemd-logind[1240]: Removed session 18. Dec 13 14:22:56.667000 audit[5231]: CRED_DISP pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.701934 kernel: audit: type=1106 audit(1734099776.667:1504): pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.702012 kernel: audit: type=1104 audit(1734099776.667:1505): pid=5231 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:22:56.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.72:22-139.178.68.195:46854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.655368 systemd[1]: run-containerd-runc-k8s.io-c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854-runc.jecW5j.mount: Deactivated successfully. Dec 13 14:23:01.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.72:22-139.178.68.195:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.713183 systemd[1]: Started sshd@18-10.128.0.72:22-139.178.68.195:43130.service. Dec 13 14:23:01.718845 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:23:01.719001 kernel: audit: type=1130 audit(1734099781.711:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.72:22-139.178.68.195:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.011000 audit[5265]: USER_ACCT pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.044767 sshd[5265]: Accepted publickey for core from 139.178.68.195 port 43130 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:02.045373 kernel: audit: type=1101 audit(1734099782.011:1508): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.045252 sshd[5265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:02.042000 audit[5265]: CRED_ACQ pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.057066 systemd[1]: Started session-19.scope. Dec 13 14:23:02.060024 systemd-logind[1240]: New session 19 of user core. Dec 13 14:23:02.074567 kernel: audit: type=1103 audit(1734099782.042:1509): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.074723 kernel: audit: type=1006 audit(1734099782.042:1510): pid=5265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:23:02.042000 audit[5265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7eb6c010 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.090001 kernel: audit: type=1300 audit(1734099782.042:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7eb6c010 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:02.071000 audit[5265]: USER_START pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.160225 kernel: audit: type=1327 audit(1734099782.042:1510): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:02.160550 kernel: audit: type=1105 audit(1734099782.071:1511): pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.160613 kernel: audit: type=1103 audit(1734099782.076:1512): pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.076000 audit[5267]: CRED_ACQ pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.335133 sshd[5265]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:02.336000 audit[5265]: USER_END pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.341066 systemd-logind[1240]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:23:02.343519 systemd[1]: sshd@18-10.128.0.72:22-139.178.68.195:43130.service: Deactivated successfully. Dec 13 14:23:02.344756 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:23:02.347168 systemd-logind[1240]: Removed session 19. Dec 13 14:23:02.336000 audit[5265]: CRED_DISP pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.396336 kernel: audit: type=1106 audit(1734099782.336:1513): pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.396494 kernel: audit: type=1104 audit(1734099782.336:1514): pid=5265 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.72:22-139.178.68.195:43130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.397132 systemd[1]: Started sshd@19-10.128.0.72:22-139.178.68.195:43136.service. Dec 13 14:23:02.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.72:22-139.178.68.195:43136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:02.690000 audit[5279]: USER_ACCT pid=5279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.694117 sshd[5279]: Accepted publickey for core from 139.178.68.195 port 43136 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:02.692000 audit[5279]: CRED_ACQ pid=5279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.692000 audit[5279]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31ed7a50 a2=3 a3=0 items=0 ppid=1 pid=5279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:02.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:02.695276 sshd[5279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:02.702363 systemd-logind[1240]: New session 20 of user core. Dec 13 14:23:02.703323 systemd[1]: Started session-20.scope. Dec 13 14:23:02.710000 audit[5279]: USER_START pid=5279 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:02.712000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.084573 sshd[5279]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:03.086000 audit[5279]: USER_END pid=5279 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.086000 audit[5279]: CRED_DISP pid=5279 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.72:22-139.178.68.195:43136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:03.090482 systemd[1]: sshd@19-10.128.0.72:22-139.178.68.195:43136.service: Deactivated successfully. Dec 13 14:23:03.092046 systemd-logind[1240]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:23:03.093321 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:23:03.095163 systemd-logind[1240]: Removed session 20. Dec 13 14:23:03.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.72:22-139.178.68.195:43144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:03.131006 systemd[1]: Started sshd@20-10.128.0.72:22-139.178.68.195:43144.service. Dec 13 14:23:03.420000 audit[5294]: USER_ACCT pid=5294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.421578 sshd[5294]: Accepted publickey for core from 139.178.68.195 port 43144 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:03.422000 audit[5294]: CRED_ACQ pid=5294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.422000 audit[5294]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1bddba30 a2=3 a3=0 items=0 ppid=1 pid=5294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:03.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:03.423642 sshd[5294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:03.430916 systemd[1]: Started session-21.scope. Dec 13 14:23:03.431538 systemd-logind[1240]: New session 21 of user core. Dec 13 14:23:03.439000 audit[5294]: USER_START pid=5294 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:03.441000 audit[5296]: CRED_ACQ pid=5296 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:05.656000 audit[5309]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.656000 audit[5309]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe9643ba50 a2=0 a3=7ffe9643ba3c items=0 ppid=2316 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.663000 audit[5309]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.663000 audit[5309]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe9643ba50 a2=0 a3=0 items=0 ppid=2316 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.693244 sshd[5294]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:05.695000 audit[5294]: USER_END pid=5294 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:05.695000 audit[5294]: CRED_DISP pid=5294 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:05.698947 systemd-logind[1240]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:23:05.699537 systemd[1]: sshd@20-10.128.0.72:22-139.178.68.195:43144.service: Deactivated successfully. Dec 13 14:23:05.700817 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:23:05.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.72:22-139.178.68.195:43144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.702867 systemd-logind[1240]: Removed session 21. Dec 13 14:23:05.714000 audit[5312]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.714000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcedb90e20 a2=0 a3=7ffcedb90e0c items=0 ppid=2316 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.718000 audit[5312]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:05.718000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcedb90e20 a2=0 a3=0 items=0 ppid=2316 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:05.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:05.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.72:22-139.178.68.195:43152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.741846 systemd[1]: Started sshd@21-10.128.0.72:22-139.178.68.195:43152.service. Dec 13 14:23:06.034000 audit[5314]: USER_ACCT pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.035520 sshd[5314]: Accepted publickey for core from 139.178.68.195 port 43152 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:06.036000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.036000 audit[5314]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d187180 a2=3 a3=0 items=0 ppid=1 pid=5314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:06.036000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:06.037955 sshd[5314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:06.045138 systemd[1]: Started session-22.scope. Dec 13 14:23:06.045797 systemd-logind[1240]: New session 22 of user core. Dec 13 14:23:06.053000 audit[5314]: USER_START pid=5314 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.055000 audit[5316]: CRED_ACQ pid=5316 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.527513 systemd[1]: run-containerd-runc-k8s.io-44c8f4d905f706fc51a5acc8e452917dd0c14827cb62e4b937f082fc2af4ff84-runc.TgTwVV.mount: Deactivated successfully. Dec 13 14:23:06.607376 sshd[5314]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:06.608000 audit[5314]: USER_END pid=5314 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.608000 audit[5314]: CRED_DISP pid=5314 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.613143 systemd[1]: sshd@21-10.128.0.72:22-139.178.68.195:43152.service: Deactivated successfully. Dec 13 14:23:06.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.72:22-139.178.68.195:43152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.614381 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:23:06.615311 systemd-logind[1240]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:23:06.616498 systemd-logind[1240]: Removed session 22. Dec 13 14:23:06.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.72:22-139.178.68.195:58934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.655088 systemd[1]: Started sshd@22-10.128.0.72:22-139.178.68.195:58934.service. Dec 13 14:23:06.665435 kubelet[2112]: I1213 14:23:06.665357 2112 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mc7jg" podStartSLOduration=83.208735112 podStartE2EDuration="1m31.665333836s" podCreationTimestamp="2024-12-13 14:21:35 +0000 UTC" firstStartedPulling="2024-12-13 14:22:42.559252302 +0000 UTC m=+90.146305758" lastFinishedPulling="2024-12-13 14:22:51.015851028 +0000 UTC m=+98.602904482" observedRunningTime="2024-12-13 14:22:52.091246633 +0000 UTC m=+99.678300100" watchObservedRunningTime="2024-12-13 14:23:06.665333836 +0000 UTC m=+114.252387304" Dec 13 14:23:06.959046 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:23:06.959215 kernel: audit: type=1101 audit(1734099786.951:1548): pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.951000 audit[5346]: USER_ACCT pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.958578 sshd[5346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:06.959841 sshd[5346]: Accepted publickey for core from 139.178.68.195 port 58934 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:06.969222 systemd[1]: Started session-23.scope. Dec 13 14:23:06.971206 systemd-logind[1240]: New session 23 of user core. Dec 13 14:23:06.956000 audit[5346]: CRED_ACQ pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.013460 kernel: audit: type=1103 audit(1734099786.956:1549): pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.013658 kernel: audit: type=1006 audit(1734099786.957:1550): pid=5346 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:23:06.957000 audit[5346]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce0aa6b0 a2=3 a3=0 items=0 ppid=1 pid=5346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:07.058356 kernel: audit: type=1300 audit(1734099786.957:1550): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffce0aa6b0 a2=3 a3=0 items=0 ppid=1 pid=5346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:07.058543 kernel: audit: type=1327 audit(1734099786.957:1550): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:06.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:07.067983 kernel: audit: type=1105 audit(1734099786.981:1551): pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.981000 audit[5346]: USER_START pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:06.985000 audit[5348]: CRED_ACQ pid=5348 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.125020 kernel: audit: type=1103 audit(1734099786.985:1552): pid=5348 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.312829 sshd[5346]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:07.314000 audit[5346]: USER_END pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.348928 kernel: audit: type=1106 audit(1734099787.314:1553): pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.350391 systemd[1]: sshd@22-10.128.0.72:22-139.178.68.195:58934.service: Deactivated successfully. Dec 13 14:23:07.351732 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:23:07.315000 audit[5346]: CRED_DISP pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.357058 systemd-logind[1240]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:23:07.359359 systemd-logind[1240]: Removed session 23. Dec 13 14:23:07.377957 kernel: audit: type=1104 audit(1734099787.315:1554): pid=5346 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:07.378112 kernel: audit: type=1131 audit(1734099787.349:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.72:22-139.178.68.195:58934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.72:22-139.178.68.195:58934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.206000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.206000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0172d6900 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:09.207000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.207000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0172d6930 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:09.207000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.207000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0113481e0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:09.243000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=209 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.243000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c01730ea80 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:09.274000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.274000 audit[1949]: AVC avc: denied { watch } for pid=1949 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:09.274000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01730eab0 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:09.274000 audit[1949]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c011348380 a2=fc6 a3=0 items=0 ppid=1832 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c514 key=(null) Dec 13 14:23:09.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3732002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:10.108000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:10.108000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:10.108000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a4bcb0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:10.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:10.108000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0016e3040 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:10.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:12.391507 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:23:12.391694 kernel: audit: type=1130 audit(1734099792.360:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.72:22-139.178.68.195:58938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.72:22-139.178.68.195:58938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.360962 systemd[1]: Started sshd@23-10.128.0.72:22-139.178.68.195:58938.service. Dec 13 14:23:12.587281 env[1228]: time="2024-12-13T14:23:12.586947094Z" level=info msg="StopPodSandbox for \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\"" Dec 13 14:23:12.587281 env[1228]: time="2024-12-13T14:23:12.587104155Z" level=info msg="TearDown network for sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" successfully" Dec 13 14:23:12.587281 env[1228]: time="2024-12-13T14:23:12.587167131Z" level=info msg="StopPodSandbox for \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" returns successfully" Dec 13 14:23:12.588521 env[1228]: time="2024-12-13T14:23:12.588474136Z" level=info msg="RemovePodSandbox for \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\"" Dec 13 14:23:12.588655 env[1228]: time="2024-12-13T14:23:12.588522790Z" level=info msg="Forcibly stopping sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\"" Dec 13 14:23:12.588655 env[1228]: time="2024-12-13T14:23:12.588638827Z" level=info msg="TearDown network for sandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" successfully" Dec 13 14:23:12.594493 env[1228]: time="2024-12-13T14:23:12.594423305Z" level=info msg="RemovePodSandbox \"398c12f75799cdca52e6ebc911534e1fab818ae9670fd694d7cdd1a42e854e38\" returns successfully" Dec 13 14:23:12.595136 env[1228]: time="2024-12-13T14:23:12.595092780Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:23:12.693004 kernel: audit: type=1101 audit(1734099792.661:1565): pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.661000 audit[5359]: USER_ACCT pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.697548 sshd[5359]: Accepted publickey for core from 139.178.68.195 port 58938 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:12.700710 sshd[5359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:12.698000 audit[5359]: CRED_ACQ pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.732952 kernel: audit: type=1103 audit(1734099792.698:1566): pid=5359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.779220 kernel: audit: type=1006 audit(1734099792.699:1567): pid=5359 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:23:12.779345 kernel: audit: type=1300 audit(1734099792.699:1567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c2f81d0 a2=3 a3=0 items=0 ppid=1 pid=5359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.699000 audit[5359]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5c2f81d0 a2=3 a3=0 items=0 ppid=1 pid=5359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.760242 systemd[1]: Started session-24.scope. Dec 13 14:23:12.778421 systemd-logind[1240]: New session 24 of user core. Dec 13 14:23:12.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:12.791349 kernel: audit: type=1327 audit(1734099792.699:1567): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:12.839170 kernel: audit: type=1105 audit(1734099792.803:1568): pid=5359 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.803000 audit[5359]: USER_START pid=5359 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.655 [WARNING][5375] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d5b37a5c-716e-4b9d-b163-b61e3e97284c", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9", Pod:"coredns-7db6d8ff4d-wmkdc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ec809a436c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.655 [INFO][5375] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.655 [INFO][5375] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" iface="eth0" netns="" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.655 [INFO][5375] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.655 [INFO][5375] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.821 [INFO][5381] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.822 [INFO][5381] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.822 [INFO][5381] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.831 [WARNING][5381] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.831 [INFO][5381] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.833 [INFO][5381] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:12.840821 env[1228]: 2024-12-13 14:23:12.835 [INFO][5375] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:12.841951 env[1228]: time="2024-12-13T14:23:12.841835943Z" level=info msg="TearDown network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" successfully" Dec 13 14:23:12.842122 env[1228]: time="2024-12-13T14:23:12.842092696Z" level=info msg="StopPodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" returns successfully" Dec 13 14:23:12.842731 env[1228]: time="2024-12-13T14:23:12.842697822Z" level=info msg="RemovePodSandbox for \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:23:12.845243 env[1228]: time="2024-12-13T14:23:12.842881190Z" level=info msg="Forcibly stopping sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\"" Dec 13 14:23:12.806000 audit[5387]: CRED_ACQ pid=5387 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:12.879697 kernel: audit: type=1103 audit(1734099792.806:1569): pid=5387 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:12.924 [WARNING][5401] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d5b37a5c-716e-4b9d-b163-b61e3e97284c", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"19b1e9c029b78a84afc69b5ff05a1755030477d736dc80ba2980c50d066830e9", Pod:"coredns-7db6d8ff4d-wmkdc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ec809a436c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:12.925 [INFO][5401] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:12.925 [INFO][5401] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" iface="eth0" netns="" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:12.925 [INFO][5401] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:12.925 [INFO][5401] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.004 [INFO][5407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.005 [INFO][5407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.005 [INFO][5407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.045 [WARNING][5407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.045 [INFO][5407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" HandleID="k8s-pod-network.96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--wmkdc-eth0" Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.074 [INFO][5407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:13.091581 env[1228]: 2024-12-13 14:23:13.077 [INFO][5401] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489" Dec 13 14:23:13.095579 env[1228]: time="2024-12-13T14:23:13.095520575Z" level=info msg="TearDown network for sandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" successfully" Dec 13 14:23:13.116138 env[1228]: time="2024-12-13T14:23:13.116037368Z" level=info msg="RemovePodSandbox \"96c7ea4db52fda6a92c1ef9d2e7ec3087d9b4d92fee5b340908571862f824489\" returns successfully" Dec 13 14:23:13.122324 env[1228]: time="2024-12-13T14:23:13.122277061Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:23:13.134000 audit[5426]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:13.134000 audit[5426]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd2f1b8f0 a2=0 a3=7fffd2f1b8dc items=0 ppid=2316 pid=5426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.168074 sshd[5359]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:13.187576 kernel: audit: type=1325 audit(1734099793.134:1570): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:13.187704 kernel: audit: type=1300 audit(1734099793.134:1570): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd2f1b8f0 a2=0 a3=7fffd2f1b8dc items=0 ppid=2316 pid=5426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.191142 systemd[1]: sshd@23-10.128.0.72:22-139.178.68.195:58938.service: Deactivated successfully. Dec 13 14:23:13.192467 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:23:13.196713 systemd-logind[1240]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:23:13.198279 systemd-logind[1240]: Removed session 24. Dec 13 14:23:13.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:13.187000 audit[5359]: USER_END pid=5359 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.187000 audit[5359]: CRED_DISP pid=5359 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.72:22-139.178.68.195:58938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.201000 audit[5426]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:13.201000 audit[5426]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffd2f1b8f0 a2=0 a3=7fffd2f1b8dc items=0 ppid=2316 pid=5426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.249 [WARNING][5437] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d45d4b8c-22c2-416b-b434-328c539f2fe5", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75", Pod:"coredns-7db6d8ff4d-pdjqf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2c5010aa00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.250 [INFO][5437] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.250 [INFO][5437] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" iface="eth0" netns="" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.250 [INFO][5437] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.250 [INFO][5437] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.300 [INFO][5446] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.300 [INFO][5446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.300 [INFO][5446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.308 [WARNING][5446] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.308 [INFO][5446] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.311 [INFO][5446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:13.315079 env[1228]: 2024-12-13 14:23:13.313 [INFO][5437] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.316028 env[1228]: time="2024-12-13T14:23:13.315111344Z" level=info msg="TearDown network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" successfully" Dec 13 14:23:13.316028 env[1228]: time="2024-12-13T14:23:13.315158362Z" level=info msg="StopPodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" returns successfully" Dec 13 14:23:13.316155 env[1228]: time="2024-12-13T14:23:13.316033190Z" level=info msg="RemovePodSandbox for \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:23:13.316155 env[1228]: time="2024-12-13T14:23:13.316090513Z" level=info msg="Forcibly stopping sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\"" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.383 [WARNING][5467] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d45d4b8c-22c2-416b-b434-328c539f2fe5", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"e11291f8eac102b40602868bc3e570a2617dc7c6130356f8431dc869c6eebb75", Pod:"coredns-7db6d8ff4d-pdjqf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia2c5010aa00", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.383 [INFO][5467] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.383 [INFO][5467] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" iface="eth0" netns="" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.383 [INFO][5467] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.383 [INFO][5467] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.436 [INFO][5473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.437 [INFO][5473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.437 [INFO][5473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.455 [WARNING][5473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.455 [INFO][5473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" HandleID="k8s-pod-network.fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-coredns--7db6d8ff4d--pdjqf-eth0" Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.459 [INFO][5473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:13.463286 env[1228]: 2024-12-13 14:23:13.461 [INFO][5467] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295" Dec 13 14:23:13.464189 env[1228]: time="2024-12-13T14:23:13.463330877Z" level=info msg="TearDown network for sandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" successfully" Dec 13 14:23:13.470542 env[1228]: time="2024-12-13T14:23:13.470461679Z" level=info msg="RemovePodSandbox \"fbfb4bf3e98637d9dd7596a3f86fb92319ac4deca838a3d28a48ae2e1c128295\" returns successfully" Dec 13 14:23:13.471319 env[1228]: time="2024-12-13T14:23:13.471274963Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.559 [WARNING][5491] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"61cc0cc6-461a-431a-bfe1-2c1336d14ad2", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c", Pod:"calico-apiserver-75bc9dcd5f-md22j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e5361611f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.559 [INFO][5491] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.559 [INFO][5491] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" iface="eth0" netns="" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.559 [INFO][5491] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.559 [INFO][5491] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.630 [INFO][5497] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.631 [INFO][5497] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.631 [INFO][5497] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.659 [WARNING][5497] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.659 [INFO][5497] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.662 [INFO][5497] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:13.665725 env[1228]: 2024-12-13 14:23:13.664 [INFO][5491] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.667109 env[1228]: time="2024-12-13T14:23:13.665770811Z" level=info msg="TearDown network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" successfully" Dec 13 14:23:13.667109 env[1228]: time="2024-12-13T14:23:13.665814295Z" level=info msg="StopPodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" returns successfully" Dec 13 14:23:13.667109 env[1228]: time="2024-12-13T14:23:13.666790662Z" level=info msg="RemovePodSandbox for \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:23:13.667109 env[1228]: time="2024-12-13T14:23:13.666862308Z" level=info msg="Forcibly stopping sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\"" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.747 [WARNING][5516] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"61cc0cc6-461a-431a-bfe1-2c1336d14ad2", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"68999b4d2b1a5cc4af4145e4d5990285930952cba5fa07b3e42be2ae1022de4c", Pod:"calico-apiserver-75bc9dcd5f-md22j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3e5361611f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.748 [INFO][5516] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.748 [INFO][5516] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" iface="eth0" netns="" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.748 [INFO][5516] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.748 [INFO][5516] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.792 [INFO][5522] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.792 [INFO][5522] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.793 [INFO][5522] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.800 [WARNING][5522] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.800 [INFO][5522] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" HandleID="k8s-pod-network.d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--md22j-eth0" Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.802 [INFO][5522] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:13.805397 env[1228]: 2024-12-13 14:23:13.803 [INFO][5516] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a" Dec 13 14:23:13.808252 env[1228]: time="2024-12-13T14:23:13.805364707Z" level=info msg="TearDown network for sandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" successfully" Dec 13 14:23:14.159549 env[1228]: time="2024-12-13T14:23:14.159406932Z" level=info msg="RemovePodSandbox \"d008d0238fc1908462a9ba927143f080e40c6cd32f7284bd88d72b72067e8e7a\" returns successfully" Dec 13 14:23:14.160484 env[1228]: time="2024-12-13T14:23:14.160439007Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.225 [WARNING][5541] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7222121-f624-4f42-98c6-6b74db8c612f", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386", Pod:"csi-node-driver-mc7jg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliec7a3822b35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.226 [INFO][5541] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.226 [INFO][5541] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" iface="eth0" netns="" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.226 [INFO][5541] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.226 [INFO][5541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.258 [INFO][5548] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.258 [INFO][5548] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.258 [INFO][5548] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.266 [WARNING][5548] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.267 [INFO][5548] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.269 [INFO][5548] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.272258 env[1228]: 2024-12-13 14:23:14.270 [INFO][5541] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.273408 env[1228]: time="2024-12-13T14:23:14.273349743Z" level=info msg="TearDown network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" successfully" Dec 13 14:23:14.273640 env[1228]: time="2024-12-13T14:23:14.273406349Z" level=info msg="StopPodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" returns successfully" Dec 13 14:23:14.274278 env[1228]: time="2024-12-13T14:23:14.274225494Z" level=info msg="RemovePodSandbox for \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:23:14.274401 env[1228]: time="2024-12-13T14:23:14.274275228Z" level=info msg="Forcibly stopping sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\"" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.326 [WARNING][5567] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7222121-f624-4f42-98c6-6b74db8c612f", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"47710e249f6693c383f9f0660c12fb05b4eaba41c2baeafb0547eef120ea6386", Pod:"csi-node-driver-mc7jg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliec7a3822b35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.326 [INFO][5567] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.326 [INFO][5567] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" iface="eth0" netns="" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.326 [INFO][5567] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.326 [INFO][5567] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.361 [INFO][5573] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.363 [INFO][5573] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.363 [INFO][5573] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.369 [WARNING][5573] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.369 [INFO][5573] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" HandleID="k8s-pod-network.d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-csi--node--driver--mc7jg-eth0" Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.371 [INFO][5573] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.373687 env[1228]: 2024-12-13 14:23:14.372 [INFO][5567] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b" Dec 13 14:23:14.374608 env[1228]: time="2024-12-13T14:23:14.373731464Z" level=info msg="TearDown network for sandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" successfully" Dec 13 14:23:14.379399 env[1228]: time="2024-12-13T14:23:14.379327843Z" level=info msg="RemovePodSandbox \"d65fbb4def1b1e6666b64d541a0e3eb27c191d3336a54a070fb77f28cef6f91b\" returns successfully" Dec 13 14:23:14.380123 env[1228]: time="2024-12-13T14:23:14.380067250Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.431 [WARNING][5591] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"88c47553-e788-4fd3-b77f-bd1733a29b49", ResourceVersion:"1121", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727", Pod:"calico-apiserver-75bc9dcd5f-zskrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif05a8ba679e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.431 [INFO][5591] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.431 [INFO][5591] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" iface="eth0" netns="" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.431 [INFO][5591] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.431 [INFO][5591] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.462 [INFO][5597] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.463 [INFO][5597] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.463 [INFO][5597] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.470 [WARNING][5597] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.471 [INFO][5597] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.473 [INFO][5597] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.476076 env[1228]: 2024-12-13 14:23:14.474 [INFO][5591] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.476946 env[1228]: time="2024-12-13T14:23:14.476119012Z" level=info msg="TearDown network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" successfully" Dec 13 14:23:14.476946 env[1228]: time="2024-12-13T14:23:14.476173962Z" level=info msg="StopPodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" returns successfully" Dec 13 14:23:14.477314 env[1228]: time="2024-12-13T14:23:14.477256385Z" level=info msg="RemovePodSandbox for \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:23:14.477424 env[1228]: time="2024-12-13T14:23:14.477322759Z" level=info msg="Forcibly stopping sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\"" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.540 [WARNING][5615] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0", GenerateName:"calico-apiserver-75bc9dcd5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"88c47553-e788-4fd3-b77f-bd1733a29b49", ResourceVersion:"1121", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75bc9dcd5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"a44d52feb21ce82ca5185c0b90fac6660ec5ae4dcf47e6ff93acc3538b2f7727", Pod:"calico-apiserver-75bc9dcd5f-zskrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif05a8ba679e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.540 [INFO][5615] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.540 [INFO][5615] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" iface="eth0" netns="" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.540 [INFO][5615] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.540 [INFO][5615] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.599 [INFO][5621] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.601 [INFO][5621] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.601 [INFO][5621] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.612 [WARNING][5621] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.612 [INFO][5621] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" HandleID="k8s-pod-network.8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--apiserver--75bc9dcd5f--zskrp-eth0" Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.614 [INFO][5621] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.617657 env[1228]: 2024-12-13 14:23:14.616 [INFO][5615] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35" Dec 13 14:23:14.618584 env[1228]: time="2024-12-13T14:23:14.617703611Z" level=info msg="TearDown network for sandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" successfully" Dec 13 14:23:14.623356 env[1228]: time="2024-12-13T14:23:14.623240907Z" level=info msg="RemovePodSandbox \"8f6c40afd42fa12f3c201cc15f395e1cf7bde1e83a8f9f779db2b91cda057d35\" returns successfully" Dec 13 14:23:14.624301 env[1228]: time="2024-12-13T14:23:14.624248812Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.677 [WARNING][5642] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0", GenerateName:"calico-kube-controllers-5bd4dcdc94-", Namespace:"calico-system", SelfLink:"", UID:"cee06149-4d07-4e52-aec3-9ed8f8ffeb91", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd4dcdc94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb", Pod:"calico-kube-controllers-5bd4dcdc94-f8666", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d9812959d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.677 [INFO][5642] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.677 [INFO][5642] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" iface="eth0" netns="" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.678 [INFO][5642] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.678 [INFO][5642] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.717 [INFO][5648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.717 [INFO][5648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.717 [INFO][5648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.724 [WARNING][5648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.724 [INFO][5648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.726 [INFO][5648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.729234 env[1228]: 2024-12-13 14:23:14.727 [INFO][5642] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.732171 env[1228]: time="2024-12-13T14:23:14.729212856Z" level=info msg="TearDown network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" successfully" Dec 13 14:23:14.732171 env[1228]: time="2024-12-13T14:23:14.729258653Z" level=info msg="StopPodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" returns successfully" Dec 13 14:23:14.732171 env[1228]: time="2024-12-13T14:23:14.729846606Z" level=info msg="RemovePodSandbox for \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:23:14.732171 env[1228]: time="2024-12-13T14:23:14.729912377Z" level=info msg="Forcibly stopping sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\"" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.784 [WARNING][5666] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0", GenerateName:"calico-kube-controllers-5bd4dcdc94-", Namespace:"calico-system", SelfLink:"", UID:"cee06149-4d07-4e52-aec3-9ed8f8ffeb91", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 21, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bd4dcdc94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-384be59be4434394efd6.c.flatcar-212911.internal", ContainerID:"162e0b7f9b72088169113d5125b174b232e65d67a1719b7e55fa0719c9804abb", Pod:"calico-kube-controllers-5bd4dcdc94-f8666", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d9812959d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.785 [INFO][5666] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.785 [INFO][5666] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" iface="eth0" netns="" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.785 [INFO][5666] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.785 [INFO][5666] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.830 [INFO][5672] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.830 [INFO][5672] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.830 [INFO][5672] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.838 [WARNING][5672] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.838 [INFO][5672] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" HandleID="k8s-pod-network.3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Workload="ci--3510--3--6--384be59be4434394efd6.c.flatcar--212911.internal-k8s-calico--kube--controllers--5bd4dcdc94--f8666-eth0" Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.841 [INFO][5672] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:23:14.844455 env[1228]: 2024-12-13 14:23:14.843 [INFO][5666] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb" Dec 13 14:23:14.845522 env[1228]: time="2024-12-13T14:23:14.845466219Z" level=info msg="TearDown network for sandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" successfully" Dec 13 14:23:14.850591 env[1228]: time="2024-12-13T14:23:14.850539736Z" level=info msg="RemovePodSandbox \"3ba767534a37463f4236458ed2213a765ff174e1e58ec6e80522ca8a3cbcf6cb\" returns successfully" Dec 13 14:23:16.239000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:16.239000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c40180 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:16.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:16.239000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:16.239000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c401a0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:16.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:16.239000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:16.239000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c401c0 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:16.239000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:16.248000 audit[2001]: AVC avc: denied { watch } for pid=2001 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:16.248000 audit[2001]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c40520 a2=fc6 a3=0 items=0 ppid=1817 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c955,c1013 key=(null) Dec 13 14:23:16.248000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:17.293865 systemd[1]: run-containerd-runc-k8s.io-c29d45b05c0da756ffcded59de4758094a6c782a3d77fc18da4389e298aa9854-runc.4bUodx.mount: Deactivated successfully. Dec 13 14:23:18.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.72:22-139.178.68.195:58570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:18.215993 systemd[1]: Started sshd@24-10.128.0.72:22-139.178.68.195:58570.service. Dec 13 14:23:18.221698 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:23:18.221837 kernel: audit: type=1130 audit(1734099798.214:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.72:22-139.178.68.195:58570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:18.512000 audit[5697]: USER_ACCT pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.544597 sshd[5697]: Accepted publickey for core from 139.178.68.195 port 58570 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:18.545158 kernel: audit: type=1101 audit(1734099798.512:1580): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.545528 sshd[5697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:18.542000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.559828 systemd[1]: Started session-25.scope. Dec 13 14:23:18.562397 systemd-logind[1240]: New session 25 of user core. Dec 13 14:23:18.574119 kernel: audit: type=1103 audit(1734099798.542:1581): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.542000 audit[5697]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d665210 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:18.619527 kernel: audit: type=1006 audit(1734099798.542:1582): pid=5697 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:23:18.619747 kernel: audit: type=1300 audit(1734099798.542:1582): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d665210 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:18.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:18.573000 audit[5697]: USER_START pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.662022 kernel: audit: type=1327 audit(1734099798.542:1582): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:18.662225 kernel: audit: type=1105 audit(1734099798.573:1583): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.579000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.686812 kernel: audit: type=1103 audit(1734099798.579:1584): pid=5699 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.854651 sshd[5697]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:18.855000 audit[5697]: USER_END pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.866325 systemd[1]: sshd@24-10.128.0.72:22-139.178.68.195:58570.service: Deactivated successfully. Dec 13 14:23:18.868758 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:23:18.870293 systemd-logind[1240]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:23:18.871828 systemd-logind[1240]: Removed session 25. Dec 13 14:23:18.855000 audit[5697]: CRED_DISP pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.916242 kernel: audit: type=1106 audit(1734099798.855:1585): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.916437 kernel: audit: type=1104 audit(1734099798.855:1586): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:18.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.72:22-139.178.68.195:58570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:23.899851 systemd[1]: Started sshd@25-10.128.0.72:22-139.178.68.195:58586.service. Dec 13 14:23:23.932966 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:23:23.933115 kernel: audit: type=1130 audit(1734099803.899:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.72:22-139.178.68.195:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:23.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.72:22-139.178.68.195:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:24.194000 audit[5715]: USER_ACCT pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.225517 sshd[5715]: Accepted publickey for core from 139.178.68.195 port 58586 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:24.226000 kernel: audit: type=1101 audit(1734099804.194:1589): pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.224000 audit[5715]: CRED_ACQ pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.226833 sshd[5715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:24.240896 systemd[1]: Started session-26.scope. Dec 13 14:23:24.243429 systemd-logind[1240]: New session 26 of user core. Dec 13 14:23:24.253336 kernel: audit: type=1103 audit(1734099804.224:1590): pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.225000 audit[5715]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff10d4a1a0 a2=3 a3=0 items=0 ppid=1 pid=5715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.313115 kernel: audit: type=1006 audit(1734099804.225:1591): pid=5715 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:23:24.313310 kernel: audit: type=1300 audit(1734099804.225:1591): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff10d4a1a0 a2=3 a3=0 items=0 ppid=1 pid=5715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:24.313366 kernel: audit: type=1327 audit(1734099804.225:1591): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:24.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:24.322534 kernel: audit: type=1105 audit(1734099804.255:1592): pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.255000 audit[5715]: USER_START pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.258000 audit[5719]: CRED_ACQ pid=5719 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.379283 kernel: audit: type=1103 audit(1734099804.258:1593): pid=5719 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.505037 sshd[5715]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:24.506000 audit[5715]: USER_END pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.541018 kernel: audit: type=1106 audit(1734099804.506:1594): pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.507000 audit[5715]: CRED_DISP pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:24.543040 systemd[1]: sshd@25-10.128.0.72:22-139.178.68.195:58586.service: Deactivated successfully. Dec 13 14:23:24.544334 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:23:24.546841 systemd-logind[1240]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:23:24.548835 systemd-logind[1240]: Removed session 26. Dec 13 14:23:24.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.72:22-139.178.68.195:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:24.565998 kernel: audit: type=1104 audit(1734099804.507:1595): pid=5715 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.72:22-139.178.68.195:39630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:29.551260 systemd[1]: Started sshd@26-10.128.0.72:22-139.178.68.195:39630.service. Dec 13 14:23:29.557008 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:23:29.557108 kernel: audit: type=1130 audit(1734099809.550:1597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.72:22-139.178.68.195:39630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:29.846000 audit[5734]: USER_ACCT pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.877542 sshd[5734]: Accepted publickey for core from 139.178.68.195 port 39630 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:29.877997 kernel: audit: type=1101 audit(1734099809.846:1598): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.876000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.878714 sshd[5734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:29.893245 systemd[1]: Started session-27.scope. Dec 13 14:23:29.894653 systemd-logind[1240]: New session 27 of user core. Dec 13 14:23:29.906072 kernel: audit: type=1103 audit(1734099809.876:1599): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.952594 kernel: audit: type=1006 audit(1734099809.877:1600): pid=5734 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:23:29.952789 kernel: audit: type=1300 audit(1734099809.877:1600): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99b6b100 a2=3 a3=0 items=0 ppid=1 pid=5734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.877000 audit[5734]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99b6b100 a2=3 a3=0 items=0 ppid=1 pid=5734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:29.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:29.904000 audit[5734]: USER_START pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.995597 kernel: audit: type=1327 audit(1734099809.877:1600): proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:29.995797 kernel: audit: type=1105 audit(1734099809.904:1601): pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.995854 kernel: audit: type=1103 audit(1734099809.907:1602): pid=5736 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:29.907000 audit[5736]: CRED_ACQ pid=5736 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:30.156639 sshd[5734]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:30.157000 audit[5734]: USER_END pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:30.191933 kernel: audit: type=1106 audit(1734099810.157:1603): pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:30.157000 audit[5734]: CRED_DISP pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:30.195372 systemd[1]: sshd@26-10.128.0.72:22-139.178.68.195:39630.service: Deactivated successfully. Dec 13 14:23:30.196598 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:23:30.199082 systemd-logind[1240]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:23:30.200561 systemd-logind[1240]: Removed session 27. Dec 13 14:23:30.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.72:22-139.178.68.195:39630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:30.217005 kernel: audit: type=1104 audit(1734099810.157:1604): pid=5734 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'