Dec 13 14:22:46.079786 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:22:46.079828 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:46.079845 kernel: BIOS-provided physical RAM map: Dec 13 14:22:46.079857 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:22:46.079869 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:22:46.079882 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:22:46.079902 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:22:46.079916 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:22:46.079930 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:22:46.079943 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:22:46.079957 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:22:46.079971 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:22:46.079985 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:22:46.079998 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:22:46.080019 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:22:46.080034 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:22:46.080048 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:22:46.080063 kernel: NX (Execute Disable) protection: active Dec 13 14:22:46.080077 kernel: efi: EFI v2.70 by EDK II Dec 13 14:22:46.080093 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:22:46.080106 kernel: random: crng init done Dec 13 14:22:46.080119 kernel: SMBIOS 2.4 present. Dec 13 14:22:46.080136 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:22:46.080150 kernel: Hypervisor detected: KVM Dec 13 14:22:46.080164 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:22:46.080178 kernel: kvm-clock: cpu 0, msr 1d619a001, primary cpu clock Dec 13 14:22:46.080194 kernel: kvm-clock: using sched offset of 12793137102 cycles Dec 13 14:22:46.080210 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:22:46.080224 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:22:46.080240 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:22:46.080255 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:22:46.080270 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:22:46.080307 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:22:46.080323 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:22:46.080337 kernel: Using GB pages for direct mapping Dec 13 14:22:46.080351 kernel: Secure boot disabled Dec 13 14:22:46.080366 kernel: ACPI: Early table checksum verification disabled Dec 13 14:22:46.080382 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:22:46.080398 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:22:46.080415 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:22:46.080441 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:22:46.080458 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:22:46.080474 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:22:46.080499 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:22:46.080514 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:22:46.080531 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:22:46.080551 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:22:46.080567 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:22:46.080582 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:22:46.080599 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:22:46.080616 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:22:46.080633 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:22:46.080649 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:22:46.080665 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:22:46.080681 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:22:46.080701 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:22:46.080718 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:22:46.080734 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:22:46.080749 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:22:46.080765 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:22:46.080780 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:22:46.080796 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:22:46.080812 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:22:46.080828 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:22:46.080847 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:22:46.080863 kernel: Zone ranges: Dec 13 14:22:46.080880 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:22:46.080897 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:22:46.080913 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:22:46.080929 kernel: Movable zone start for each node Dec 13 14:22:46.080946 kernel: Early memory node ranges Dec 13 14:22:46.080961 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:22:46.080978 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:22:46.080999 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:22:46.081015 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:22:46.081032 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:22:46.081048 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:22:46.081065 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:22:46.081082 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:22:46.081099 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:22:46.081115 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:22:46.081132 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:22:46.081153 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:22:46.081169 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:22:46.081186 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:22:46.081203 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:22:46.081219 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:22:46.081236 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:22:46.081253 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:22:46.081269 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:22:46.081286 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:22:46.081326 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:22:46.081343 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:22:46.081360 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:22:46.081377 kernel: Booting paravirtualized kernel on KVM Dec 13 14:22:46.081394 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:22:46.081410 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:22:46.081427 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:22:46.081443 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:22:46.081459 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:22:46.081487 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:22:46.081505 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:22:46.081522 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:22:46.081539 kernel: Policy zone: Normal Dec 13 14:22:46.081558 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:46.081575 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:22:46.081592 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:22:46.081609 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:22:46.081627 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:22:46.081648 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:22:46.081664 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:22:46.081681 kernel: Kernel/User page tables isolation: enabled Dec 13 14:22:46.081697 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:22:46.081714 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:22:46.081730 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:22:46.081747 kernel: rcu: RCU event tracing is enabled. Dec 13 14:22:46.081764 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:22:46.081785 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:22:46.081814 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:22:46.081832 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:22:46.081854 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:22:46.081871 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:22:46.081889 kernel: Console: colour dummy device 80x25 Dec 13 14:22:46.081907 kernel: printk: console [ttyS0] enabled Dec 13 14:22:46.081925 kernel: ACPI: Core revision 20210730 Dec 13 14:22:46.081942 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:22:46.081960 kernel: x2apic enabled Dec 13 14:22:46.081982 kernel: Switched APIC routing to physical x2apic. Dec 13 14:22:46.081999 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:22:46.082024 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:22:46.082042 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:22:46.082060 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:22:46.082078 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:22:46.082096 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:22:46.082117 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:22:46.082135 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:22:46.082152 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:22:46.082171 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:22:46.082188 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:22:46.082206 kernel: RETBleed: Mitigation: IBRS Dec 13 14:22:46.082223 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:22:46.082239 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:22:46.082258 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:22:46.082280 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:22:46.082311 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:22:46.082329 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:22:46.082347 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:22:46.082365 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:22:46.082382 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:22:46.082400 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:22:46.082419 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:22:46.082436 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:22:46.082458 kernel: LSM: Security Framework initializing Dec 13 14:22:46.082475 kernel: SELinux: Initializing. Dec 13 14:22:46.082500 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:22:46.082518 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:22:46.082534 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:22:46.082552 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:22:46.082570 kernel: signal: max sigframe size: 1776 Dec 13 14:22:46.082587 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:22:46.082604 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:22:46.082626 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:22:46.082644 kernel: x86: Booting SMP configuration: Dec 13 14:22:46.082662 kernel: .... node #0, CPUs: #1 Dec 13 14:22:46.082681 kernel: kvm-clock: cpu 1, msr 1d619a041, secondary cpu clock Dec 13 14:22:46.082699 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:22:46.082718 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:22:46.082735 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:22:46.082752 kernel: smpboot: Max logical packages: 1 Dec 13 14:22:46.082772 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:22:46.082790 kernel: devtmpfs: initialized Dec 13 14:22:46.082809 kernel: x86/mm: Memory block size: 128MB Dec 13 14:22:46.082827 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:22:46.082845 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:22:46.082863 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:22:46.082881 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:22:46.082899 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:22:46.082916 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:22:46.082938 kernel: audit: type=2000 audit(1734099764.612:1): state=initialized audit_enabled=0 res=1 Dec 13 14:22:46.082956 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:22:46.082974 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:22:46.082992 kernel: cpuidle: using governor menu Dec 13 14:22:46.083010 kernel: ACPI: bus type PCI registered Dec 13 14:22:46.083028 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:22:46.083045 kernel: dca service started, version 1.12.1 Dec 13 14:22:46.083063 kernel: PCI: Using configuration type 1 for base access Dec 13 14:22:46.083081 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:22:46.083102 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:22:46.083119 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:22:46.083136 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:22:46.083153 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:22:46.083170 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:22:46.083187 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:22:46.083205 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:22:46.083223 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:22:46.083240 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:22:46.083261 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:22:46.083278 kernel: ACPI: Interpreter enabled Dec 13 14:22:46.088355 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:22:46.088381 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:22:46.088398 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:22:46.088415 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:22:46.088431 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:22:46.088661 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:22:46.088828 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:22:46.088848 kernel: PCI host bridge to bus 0000:00 Dec 13 14:22:46.089001 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:22:46.089143 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:22:46.089283 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:22:46.089436 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:22:46.089582 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:22:46.089839 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:22:46.090043 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:22:46.090236 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:22:46.090443 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:22:46.090645 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:22:46.090846 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:22:46.091016 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:22:46.091188 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:22:46.091374 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:22:46.091542 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:22:46.091714 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:22:46.091882 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:22:46.092053 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:22:46.092081 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:22:46.092100 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:22:46.092118 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:22:46.092137 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:22:46.092153 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:22:46.092171 kernel: iommu: Default domain type: Translated Dec 13 14:22:46.092190 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:22:46.092208 kernel: vgaarb: loaded Dec 13 14:22:46.092225 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:22:46.092248 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:22:46.092266 kernel: PTP clock support registered Dec 13 14:22:46.092284 kernel: Registered efivars operations Dec 13 14:22:46.092317 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:22:46.092341 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:22:46.092356 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:22:46.092374 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:22:46.092391 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:22:46.092408 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:22:46.092429 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:22:46.092446 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:22:46.092464 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:22:46.092488 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:22:46.092504 kernel: pnp: PnP ACPI init Dec 13 14:22:46.092521 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:22:46.092539 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:22:46.092556 kernel: NET: Registered PF_INET protocol family Dec 13 14:22:46.092574 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:22:46.092596 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:22:46.092614 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:22:46.092631 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:22:46.092649 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:22:46.092667 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:22:46.092684 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:22:46.092701 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:22:46.092718 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:22:46.092739 kernel: NET: Registered PF_XDP protocol family Dec 13 14:22:46.092904 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:22:46.093056 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:22:46.093204 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:22:46.101274 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:22:46.101544 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:22:46.101572 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:22:46.101590 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:22:46.101612 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:22:46.101628 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:22:46.101645 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:22:46.101662 kernel: clocksource: Switched to clocksource tsc Dec 13 14:22:46.101679 kernel: Initialise system trusted keyrings Dec 13 14:22:46.101696 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:22:46.101713 kernel: Key type asymmetric registered Dec 13 14:22:46.101729 kernel: Asymmetric key parser 'x509' registered Dec 13 14:22:46.101759 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:22:46.101779 kernel: io scheduler mq-deadline registered Dec 13 14:22:46.101797 kernel: io scheduler kyber registered Dec 13 14:22:46.101814 kernel: io scheduler bfq registered Dec 13 14:22:46.101832 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:22:46.101850 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:22:46.102043 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:22:46.105821 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:22:46.106026 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:22:46.106057 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:22:46.106224 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:22:46.106246 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:22:46.106264 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:22:46.106281 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:22:46.106314 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:22:46.106331 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:22:46.106534 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:22:46.106567 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:22:46.106584 kernel: i8042: Warning: Keylock active Dec 13 14:22:46.106601 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:22:46.106618 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:22:46.106789 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:22:46.106939 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:22:46.107084 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:22:45 UTC (1734099765) Dec 13 14:22:46.107233 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:22:46.107259 kernel: intel_pstate: CPU model not supported Dec 13 14:22:46.107277 kernel: pstore: Registered efi as persistent store backend Dec 13 14:22:46.113430 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:22:46.113456 kernel: Segment Routing with IPv6 Dec 13 14:22:46.113474 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:22:46.113502 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:22:46.113519 kernel: Key type dns_resolver registered Dec 13 14:22:46.113538 kernel: IPI shorthand broadcast: enabled Dec 13 14:22:46.113554 kernel: sched_clock: Marking stable (691359536, 128774766)->(833301430, -13167128) Dec 13 14:22:46.113575 kernel: registered taskstats version 1 Dec 13 14:22:46.113592 kernel: Loading compiled-in X.509 certificates Dec 13 14:22:46.113609 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:22:46.113627 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:22:46.113644 kernel: Key type .fscrypt registered Dec 13 14:22:46.113661 kernel: Key type fscrypt-provisioning registered Dec 13 14:22:46.113678 kernel: pstore: Using crash dump compression: deflate Dec 13 14:22:46.113696 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:22:46.113713 kernel: ima: No architecture policies found Dec 13 14:22:46.113734 kernel: clk: Disabling unused clocks Dec 13 14:22:46.113750 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:22:46.113767 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:22:46.113784 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:22:46.113801 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:22:46.113819 kernel: Run /init as init process Dec 13 14:22:46.113836 kernel: with arguments: Dec 13 14:22:46.113853 kernel: /init Dec 13 14:22:46.113869 kernel: with environment: Dec 13 14:22:46.113890 kernel: HOME=/ Dec 13 14:22:46.113907 kernel: TERM=linux Dec 13 14:22:46.113923 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:22:46.113945 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:46.113967 systemd[1]: Detected virtualization kvm. Dec 13 14:22:46.113985 systemd[1]: Detected architecture x86-64. Dec 13 14:22:46.114002 systemd[1]: Running in initrd. Dec 13 14:22:46.114024 systemd[1]: No hostname configured, using default hostname. Dec 13 14:22:46.114041 systemd[1]: Hostname set to . Dec 13 14:22:46.114060 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:46.114078 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:22:46.114096 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:46.114115 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:46.114134 systemd[1]: Reached target paths.target. Dec 13 14:22:46.114152 systemd[1]: Reached target slices.target. Dec 13 14:22:46.114170 systemd[1]: Reached target swap.target. Dec 13 14:22:46.114192 systemd[1]: Reached target timers.target. Dec 13 14:22:46.114212 systemd[1]: Listening on iscsid.socket. Dec 13 14:22:46.114231 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:22:46.114250 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:22:46.114269 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:22:46.114287 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:22:46.114322 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:46.114344 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:46.114362 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:46.114400 systemd[1]: Reached target sockets.target. Dec 13 14:22:46.114422 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:46.114459 systemd[1]: Finished network-cleanup.service. Dec 13 14:22:46.114509 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:22:46.114530 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:46.114553 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:46.114572 systemd[1]: Starting systemd-resolved.service... Dec 13 14:22:46.114592 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:22:46.114611 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:46.114629 kernel: audit: type=1130 audit(1734099766.082:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.114648 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:22:46.114667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:22:46.114686 kernel: audit: type=1130 audit(1734099766.092:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.114709 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:22:46.114728 kernel: audit: type=1130 audit(1734099766.106:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.114748 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:22:46.114772 systemd-journald[189]: Journal started Dec 13 14:22:46.114867 systemd-journald[189]: Runtime Journal (/run/log/journal/53dce008f0e5d859634ce9010a74270c) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:22:46.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.124861 systemd[1]: Started systemd-journald.service. Dec 13 14:22:46.124917 kernel: audit: type=1130 audit(1734099766.116:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.124944 kernel: audit: type=1130 audit(1734099766.120:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.121576 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:22:46.125911 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 14:22:46.154275 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:22:46.167516 kernel: audit: type=1130 audit(1734099766.157:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.159711 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:22:46.184164 systemd-resolved[191]: Positive Trust Anchors: Dec 13 14:22:46.184615 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:22:46.184683 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:22:46.200617 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:22:46.200656 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:22:46.193785 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 14:22:46.199588 systemd[1]: Started systemd-resolved.service. Dec 13 14:22:46.210408 kernel: Bridge firewalling registered Dec 13 14:22:46.210444 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:22:46.207347 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 14:22:46.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.226556 systemd[1]: Reached target nss-lookup.target. Dec 13 14:22:46.241582 kernel: audit: type=1130 audit(1734099766.225:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.246313 kernel: SCSI subsystem initialized Dec 13 14:22:46.265317 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:22:46.265385 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:22:46.269324 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:22:46.271730 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 14:22:46.273062 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:46.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.284566 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:46.294424 kernel: audit: type=1130 audit(1734099766.282:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.297499 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:46.307427 kernel: audit: type=1130 audit(1734099766.300:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.309318 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:22:46.329324 kernel: iscsi: registered transport (tcp) Dec 13 14:22:46.356332 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:22:46.356409 kernel: QLogic iSCSI HBA Driver Dec 13 14:22:46.400031 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:22:46.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.404796 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:22:46.462356 kernel: raid6: avx2x4 gen() 18377 MB/s Dec 13 14:22:46.479335 kernel: raid6: avx2x4 xor() 8257 MB/s Dec 13 14:22:46.496327 kernel: raid6: avx2x2 gen() 18410 MB/s Dec 13 14:22:46.513333 kernel: raid6: avx2x2 xor() 18644 MB/s Dec 13 14:22:46.530334 kernel: raid6: avx2x1 gen() 14208 MB/s Dec 13 14:22:46.547332 kernel: raid6: avx2x1 xor() 16195 MB/s Dec 13 14:22:46.564330 kernel: raid6: sse2x4 gen() 11075 MB/s Dec 13 14:22:46.581361 kernel: raid6: sse2x4 xor() 6704 MB/s Dec 13 14:22:46.598338 kernel: raid6: sse2x2 gen() 12035 MB/s Dec 13 14:22:46.615333 kernel: raid6: sse2x2 xor() 7438 MB/s Dec 13 14:22:46.632329 kernel: raid6: sse2x1 gen() 10576 MB/s Dec 13 14:22:46.649776 kernel: raid6: sse2x1 xor() 5189 MB/s Dec 13 14:22:46.649811 kernel: raid6: using algorithm avx2x2 gen() 18410 MB/s Dec 13 14:22:46.649833 kernel: raid6: .... xor() 18644 MB/s, rmw enabled Dec 13 14:22:46.650490 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:22:46.665332 kernel: xor: automatically using best checksumming function avx Dec 13 14:22:46.771321 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:22:46.783761 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:22:46.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.783000 audit: BPF prog-id=7 op=LOAD Dec 13 14:22:46.783000 audit: BPF prog-id=8 op=LOAD Dec 13 14:22:46.786030 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:46.802435 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 14:22:46.809553 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:46.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.814705 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:22:46.835736 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Dec 13 14:22:46.874693 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:22:46.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:46.876793 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:46.942779 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:46.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:47.013274 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:22:47.044327 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:22:47.044398 kernel: AES CTR mode by8 optimization enabled Dec 13 14:22:47.049316 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:22:47.064313 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:22:47.156922 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:22:47.171422 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:22:47.171666 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:22:47.171887 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:22:47.172100 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:22:47.172332 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:22:47.172369 kernel: GPT:17805311 != 25165823 Dec 13 14:22:47.172390 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:22:47.172410 kernel: GPT:17805311 != 25165823 Dec 13 14:22:47.172430 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:22:47.172449 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:22:47.172470 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:22:47.226052 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:22:47.240488 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (440) Dec 13 14:22:47.235639 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:22:47.252030 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:22:47.261551 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:22:47.271149 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:47.275680 systemd[1]: Starting disk-uuid.service... Dec 13 14:22:47.289949 disk-uuid[514]: Primary Header is updated. Dec 13 14:22:47.289949 disk-uuid[514]: Secondary Entries is updated. Dec 13 14:22:47.289949 disk-uuid[514]: Secondary Header is updated. Dec 13 14:22:47.306314 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:22:47.314327 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:22:47.342341 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:22:48.355332 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:22:48.356147 disk-uuid[515]: The operation has completed successfully. Dec 13 14:22:48.422115 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:22:48.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.422258 systemd[1]: Finished disk-uuid.service. Dec 13 14:22:48.437283 systemd[1]: Starting verity-setup.service... Dec 13 14:22:48.466701 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:22:48.540266 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:22:48.542997 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:22:48.554929 systemd[1]: Finished verity-setup.service. Dec 13 14:22:48.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.647578 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:22:48.648183 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:22:48.648650 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:22:48.707584 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:48.707629 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:22:48.707645 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:22:48.707659 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:22:48.649743 systemd[1]: Starting ignition-setup.service... Dec 13 14:22:48.689772 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:22:48.722452 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:22:48.737130 systemd[1]: Finished ignition-setup.service. Dec 13 14:22:48.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.760056 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:22:48.812524 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:22:48.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.821000 audit: BPF prog-id=9 op=LOAD Dec 13 14:22:48.823814 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:48.858875 systemd-networkd[689]: lo: Link UP Dec 13 14:22:48.858888 systemd-networkd[689]: lo: Gained carrier Dec 13 14:22:48.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.859965 systemd-networkd[689]: Enumeration completed Dec 13 14:22:48.860106 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:48.860515 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:48.863145 systemd-networkd[689]: eth0: Link UP Dec 13 14:22:48.863152 systemd-networkd[689]: eth0: Gained carrier Dec 13 14:22:48.866859 systemd[1]: Reached target network.target. Dec 13 14:22:48.875429 systemd-networkd[689]: eth0: DHCPv4 address 10.128.0.77/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:22:48.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.910970 systemd[1]: Starting iscsiuio.service... Dec 13 14:22:48.972497 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:48.972497 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:22:48.972497 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:22:48.972497 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:22:48.972497 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:22:48.972497 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:22:48.972497 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:22:48.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.932641 systemd[1]: Started iscsiuio.service. Dec 13 14:22:49.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.025540 ignition[637]: Ignition 2.14.0 Dec 13 14:22:49.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:48.949031 systemd[1]: Starting iscsid.service... Dec 13 14:22:49.025554 ignition[637]: Stage: fetch-offline Dec 13 14:22:48.961981 systemd[1]: Started iscsid.service. Dec 13 14:22:49.025650 ignition[637]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:48.981284 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:22:49.025695 ignition[637]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:49.004197 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:22:49.045873 ignition[637]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:49.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.023823 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:22:49.046099 ignition[637]: parsed url from cmdline: "" Dec 13 14:22:49.049646 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:49.046106 ignition[637]: no config URL provided Dec 13 14:22:49.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.064627 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:49.046114 ignition[637]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:22:49.083229 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:22:49.046126 ignition[637]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:22:49.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.099927 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:22:49.046136 ignition[637]: failed to fetch config: resource requires networking Dec 13 14:22:49.124921 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:22:49.046470 ignition[637]: Ignition finished successfully Dec 13 14:22:49.140782 systemd[1]: Starting ignition-fetch.service... Dec 13 14:22:49.151907 ignition[713]: Ignition 2.14.0 Dec 13 14:22:49.174541 unknown[713]: fetched base config from "system" Dec 13 14:22:49.151915 ignition[713]: Stage: fetch Dec 13 14:22:49.174563 unknown[713]: fetched base config from "system" Dec 13 14:22:49.152037 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:49.174580 unknown[713]: fetched user config from "gcp" Dec 13 14:22:49.152063 ignition[713]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:49.190939 systemd[1]: Finished ignition-fetch.service. Dec 13 14:22:49.159943 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:49.200038 systemd[1]: Starting ignition-kargs.service... Dec 13 14:22:49.160122 ignition[713]: parsed url from cmdline: "" Dec 13 14:22:49.229937 systemd[1]: Finished ignition-kargs.service. Dec 13 14:22:49.160129 ignition[713]: no config URL provided Dec 13 14:22:49.239084 systemd[1]: Starting ignition-disks.service... Dec 13 14:22:49.160136 ignition[713]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:22:49.274830 systemd[1]: Finished ignition-disks.service. Dec 13 14:22:49.160147 ignition[713]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:22:49.290768 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:22:49.160190 ignition[713]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:22:49.306471 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:49.170125 ignition[713]: GET result: OK Dec 13 14:22:49.306609 systemd[1]: Reached target local-fs.target. Dec 13 14:22:49.170213 ignition[713]: parsing config with SHA512: 5679cf22142d49b0afd8f453ec23913b237495bae2366c2dcc4df062fcdd2718ca9566aa106ae147f6deb69b21ba7adb67dde222215435e41df548c3565ca49b Dec 13 14:22:49.328467 systemd[1]: Reached target sysinit.target. Dec 13 14:22:49.175974 ignition[713]: fetch: fetch complete Dec 13 14:22:49.343453 systemd[1]: Reached target basic.target. Dec 13 14:22:49.175990 ignition[713]: fetch: fetch passed Dec 13 14:22:49.357694 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:22:49.176054 ignition[713]: Ignition finished successfully Dec 13 14:22:49.212592 ignition[719]: Ignition 2.14.0 Dec 13 14:22:49.212602 ignition[719]: Stage: kargs Dec 13 14:22:49.212741 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:49.212772 ignition[719]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:49.220044 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:49.221278 ignition[719]: kargs: kargs passed Dec 13 14:22:49.221351 ignition[719]: Ignition finished successfully Dec 13 14:22:49.250089 ignition[725]: Ignition 2.14.0 Dec 13 14:22:49.250099 ignition[725]: Stage: disks Dec 13 14:22:49.250241 ignition[725]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:49.250273 ignition[725]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:49.257929 ignition[725]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:49.259334 ignition[725]: disks: disks passed Dec 13 14:22:49.259393 ignition[725]: Ignition finished successfully Dec 13 14:22:49.399760 systemd-fsck[733]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:22:49.601369 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:22:49.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.610562 systemd[1]: Mounting sysroot.mount... Dec 13 14:22:49.639321 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:22:49.640030 systemd[1]: Mounted sysroot.mount. Dec 13 14:22:49.640401 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:22:49.657232 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:22:49.674118 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:22:49.674183 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:22:49.674221 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:22:49.772479 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (739) Dec 13 14:22:49.772524 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:49.772548 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:22:49.772569 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:22:49.772590 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:22:49.690001 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:22:49.713643 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:22:49.758751 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:22:49.805632 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:22:49.799925 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:22:49.833461 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:22:49.843430 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:22:49.853452 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:22:49.860546 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:22:49.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.864593 systemd[1]: Starting ignition-mount.service... Dec 13 14:22:49.878662 systemd[1]: Starting sysroot-boot.service... Dec 13 14:22:49.887507 systemd-networkd[689]: eth0: Gained IPv6LL Dec 13 14:22:49.907738 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:22:49.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.907873 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:22:49.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:49.953636 ignition[807]: INFO : Ignition 2.14.0 Dec 13 14:22:49.953636 ignition[807]: INFO : Stage: mount Dec 13 14:22:49.953636 ignition[807]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:49.953636 ignition[807]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:49.953636 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:49.953636 ignition[807]: INFO : mount: mount passed Dec 13 14:22:49.953636 ignition[807]: INFO : Ignition finished successfully Dec 13 14:22:50.077408 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (814) Dec 13 14:22:50.077448 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:22:50.077482 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:22:50.077504 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:22:50.077527 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:22:49.914245 systemd[1]: Finished sysroot-boot.service. Dec 13 14:22:50.096453 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (833) Dec 13 14:22:49.933703 systemd[1]: Finished ignition-mount.service. Dec 13 14:22:49.944540 systemd[1]: Starting ignition-files.service... Dec 13 14:22:49.964241 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:22:50.119477 ignition[833]: INFO : Ignition 2.14.0 Dec 13 14:22:50.119477 ignition[833]: INFO : Stage: files Dec 13 14:22:50.119477 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:50.119477 ignition[833]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:50.119477 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:50.119477 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:22:50.119477 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:22:50.119477 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:22:50.119477 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:22:50.119477 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:22:50.119477 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3811812297" Dec 13 14:22:50.119477 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3811812297": device or resource busy Dec 13 14:22:50.119477 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3811812297", trying btrfs: device or resource busy Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3811812297" Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3811812297" Dec 13 14:22:50.119477 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3811812297" Dec 13 14:22:50.021744 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:22:50.389429 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3811812297" Dec 13 14:22:50.389429 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:22:50.389429 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:50.389429 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:22:50.389429 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 14:22:50.069254 unknown[833]: wrote ssh authorized keys file for user: core Dec 13 14:22:51.071412 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:22:51.071412 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1933613947" Dec 13 14:22:51.105468 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1933613947": device or resource busy Dec 13 14:22:51.105468 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1933613947", trying btrfs: device or resource busy Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1933613947" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1933613947" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem1933613947" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem1933613947" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:51.105468 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:22:51.093565 systemd[1]: mnt-oem1933613947.mount: Deactivated successfully. Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3125446789" Dec 13 14:22:51.358478 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3125446789": device or resource busy Dec 13 14:22:51.358478 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3125446789", trying btrfs: device or resource busy Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3125446789" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3125446789" Dec 13 14:22:51.358478 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem3125446789" Dec 13 14:22:51.111944 systemd[1]: mnt-oem3125446789.mount: Deactivated successfully. Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3125446789" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem421140043" Dec 13 14:22:51.612496 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem421140043": device or resource busy Dec 13 14:22:51.612496 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem421140043", trying btrfs: device or resource busy Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem421140043" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem421140043" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem421140043" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem421140043" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:51.612496 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:22:51.859518 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 14:22:51.878897 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:22:51.897465 ignition[833]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:51.897465 ignition[833]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:22:51.897465 ignition[833]: INFO : files: files passed Dec 13 14:22:51.897465 ignition[833]: INFO : Ignition finished successfully Dec 13 14:22:52.446633 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:22:52.446671 kernel: audit: type=1130 audit(1734099771.896:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446689 kernel: audit: type=1130 audit(1734099771.986:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446705 kernel: audit: type=1130 audit(1734099772.020:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446720 kernel: audit: type=1131 audit(1734099772.020:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446737 kernel: audit: type=1130 audit(1734099772.126:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446752 kernel: audit: type=1131 audit(1734099772.126:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446766 kernel: audit: type=1130 audit(1734099772.281:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.446780 kernel: audit: type=1131 audit(1734099772.418:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:51.887877 systemd[1]: Finished ignition-files.service. Dec 13 14:22:51.908390 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:22:51.940631 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:22:52.509677 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:22:51.941688 systemd[1]: Starting ignition-quench.service... Dec 13 14:22:51.960006 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:22:51.987929 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:22:51.988070 systemd[1]: Finished ignition-quench.service. Dec 13 14:22:52.021873 systemd[1]: Reached target ignition-complete.target. Dec 13 14:22:52.095360 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:22:52.119364 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:22:52.119598 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:22:52.127865 systemd[1]: Reached target initrd-fs.target. Dec 13 14:22:52.680501 kernel: audit: type=1131 audit(1734099772.652:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.189673 systemd[1]: Reached target initrd.target. Dec 13 14:22:52.225698 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:22:52.732472 kernel: audit: type=1131 audit(1734099772.694:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.226896 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:22:52.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.260777 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:22:52.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.283998 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:22:52.772438 ignition[871]: INFO : Ignition 2.14.0 Dec 13 14:22:52.772438 ignition[871]: INFO : Stage: umount Dec 13 14:22:52.772438 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:22:52.772438 ignition[871]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:22:52.341110 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:22:52.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.845718 iscsid[698]: iscsid shutting down. Dec 13 14:22:52.859437 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:22:52.859437 ignition[871]: INFO : umount: umount passed Dec 13 14:22:52.859437 ignition[871]: INFO : Ignition finished successfully Dec 13 14:22:52.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.353674 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:22:52.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.374728 systemd[1]: Stopped target timers.target. Dec 13 14:22:52.396687 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:22:52.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.396877 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:22:52.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.419952 systemd[1]: Stopped target initrd.target. Dec 13 14:22:52.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.460785 systemd[1]: Stopped target basic.target. Dec 13 14:22:52.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.474741 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:22:52.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.492754 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:22:53.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.517748 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:22:52.531832 systemd[1]: Stopped target remote-fs.target. Dec 13 14:22:52.553744 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:22:52.569758 systemd[1]: Stopped target sysinit.target. Dec 13 14:22:52.585816 systemd[1]: Stopped target local-fs.target. Dec 13 14:22:52.600734 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:22:53.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.616728 systemd[1]: Stopped target swap.target. Dec 13 14:22:53.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.631657 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:22:52.631841 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:22:53.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.653991 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:22:53.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:53.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.688713 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:22:52.688915 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:22:52.695928 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:22:52.696216 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:22:52.742848 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:22:53.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.743023 systemd[1]: Stopped ignition-files.service. Dec 13 14:22:53.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:53.237000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:22:52.760277 systemd[1]: Stopping ignition-mount.service... Dec 13 14:22:52.786975 systemd[1]: Stopping iscsid.service... Dec 13 14:22:53.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.810452 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:22:53.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.810756 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:22:53.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.839034 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:22:52.852481 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:22:53.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.852735 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:22:52.859840 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:22:52.860007 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:22:53.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.894847 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:22:53.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.895927 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:22:53.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.896036 systemd[1]: Stopped iscsid.service. Dec 13 14:22:52.906263 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:22:52.906407 systemd[1]: Stopped ignition-mount.service. Dec 13 14:22:53.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.921330 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:22:53.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.921450 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:22:53.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:53.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:52.943175 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:22:52.943349 systemd[1]: Stopped ignition-disks.service. Dec 13 14:22:52.957555 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:22:52.957635 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:22:52.972570 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:22:52.972649 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:22:53.562456 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Dec 13 14:22:52.987561 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:22:52.987650 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:22:53.003525 systemd[1]: Stopped target paths.target. Dec 13 14:22:53.017442 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:22:53.021396 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:22:53.033427 systemd[1]: Stopped target slices.target. Dec 13 14:22:53.046468 systemd[1]: Stopped target sockets.target. Dec 13 14:22:53.060512 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:22:53.060587 systemd[1]: Closed iscsid.socket. Dec 13 14:22:53.067689 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:22:53.067777 systemd[1]: Stopped ignition-setup.service. Dec 13 14:22:53.080710 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:22:53.080778 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:22:53.102758 systemd[1]: Stopping iscsiuio.service... Dec 13 14:22:53.116786 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:22:53.116910 systemd[1]: Stopped iscsiuio.service. Dec 13 14:22:53.131835 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:22:53.131941 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:22:53.148485 systemd[1]: Stopped target network.target. Dec 13 14:22:53.162481 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:22:53.162554 systemd[1]: Closed iscsiuio.socket. Dec 13 14:22:53.178709 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:22:53.182375 systemd-networkd[689]: eth0: DHCPv6 lease lost Dec 13 14:22:53.572000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:22:53.185775 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:22:53.207894 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:22:53.208022 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:22:53.216284 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:22:53.216458 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:22:53.239219 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:22:53.239263 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:22:53.254541 systemd[1]: Stopping network-cleanup.service... Dec 13 14:22:53.267417 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:22:53.267529 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:22:53.267701 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:22:53.267751 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:22:53.288717 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:22:53.288782 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:22:53.306669 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:22:53.323158 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:22:53.323828 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:22:53.323977 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:22:53.330993 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:22:53.331077 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:22:53.353576 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:22:53.353623 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:22:53.369554 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:22:53.369616 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:22:53.379731 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:22:53.379789 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:22:53.401610 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:22:53.401674 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:22:53.418649 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:22:53.441440 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:22:53.441565 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:22:53.458120 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:22:53.458239 systemd[1]: Stopped network-cleanup.service. Dec 13 14:22:53.472989 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:22:53.473117 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:22:53.488734 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:22:53.504509 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:22:53.526878 systemd[1]: Switching root. Dec 13 14:22:53.575216 systemd-journald[189]: Journal stopped Dec 13 14:22:58.174855 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:22:58.174966 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:22:58.174990 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:22:58.175023 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:22:58.175053 kernel: SELinux: policy capability open_perms=1 Dec 13 14:22:58.175081 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:22:58.175103 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:22:58.175126 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:22:58.175147 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:22:58.175169 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:22:58.175191 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:22:58.175215 systemd[1]: Successfully loaded SELinux policy in 106.037ms. Dec 13 14:22:58.175261 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.411ms. Dec 13 14:22:58.175288 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:22:58.176151 systemd[1]: Detected virtualization kvm. Dec 13 14:22:58.176179 systemd[1]: Detected architecture x86-64. Dec 13 14:22:58.176206 systemd[1]: Detected first boot. Dec 13 14:22:58.176231 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:22:58.176257 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:22:58.176284 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:22:58.176337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:22:58.176367 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:22:58.176396 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:22:58.176434 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 14:22:58.176457 kernel: audit: type=1334 audit(1734099777.248:88): prog-id=12 op=LOAD Dec 13 14:22:58.176477 kernel: audit: type=1334 audit(1734099777.248:89): prog-id=3 op=UNLOAD Dec 13 14:22:58.176496 kernel: audit: type=1334 audit(1734099777.253:90): prog-id=13 op=LOAD Dec 13 14:22:58.176517 kernel: audit: type=1334 audit(1734099777.260:91): prog-id=14 op=LOAD Dec 13 14:22:58.176539 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:22:58.176577 kernel: audit: type=1334 audit(1734099777.260:92): prog-id=4 op=UNLOAD Dec 13 14:22:58.176598 kernel: audit: type=1334 audit(1734099777.260:93): prog-id=5 op=UNLOAD Dec 13 14:22:58.176620 kernel: audit: type=1131 audit(1734099777.263:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.176648 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:22:58.176671 kernel: audit: type=1334 audit(1734099777.331:95): prog-id=12 op=UNLOAD Dec 13 14:22:58.176694 kernel: audit: type=1130 audit(1734099777.346:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.176716 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:22:58.176740 kernel: audit: type=1131 audit(1734099777.346:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.176768 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:22:58.176792 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:22:58.176816 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:22:58.176840 systemd[1]: Created slice system-getty.slice. Dec 13 14:22:58.176862 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:22:58.176884 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:22:58.176905 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:22:58.176933 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:22:58.176955 systemd[1]: Created slice user.slice. Dec 13 14:22:58.176978 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:22:58.177001 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:22:58.177024 systemd[1]: Set up automount boot.automount. Dec 13 14:22:58.177046 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:22:58.177069 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:22:58.177092 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:22:58.177116 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:22:58.177147 systemd[1]: Reached target integritysetup.target. Dec 13 14:22:58.177169 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:22:58.177192 systemd[1]: Reached target remote-fs.target. Dec 13 14:22:58.177216 systemd[1]: Reached target slices.target. Dec 13 14:22:58.177239 systemd[1]: Reached target swap.target. Dec 13 14:22:58.177265 systemd[1]: Reached target torcx.target. Dec 13 14:22:58.177288 systemd[1]: Reached target veritysetup.target. Dec 13 14:22:58.177329 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:22:58.177352 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:22:58.177380 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:22:58.177403 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:22:58.177427 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:22:58.177450 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:22:58.177479 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:22:58.177502 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:22:58.177526 systemd[1]: Mounting media.mount... Dec 13 14:22:58.177558 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:58.177581 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:22:58.177605 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:22:58.177635 systemd[1]: Mounting tmp.mount... Dec 13 14:22:58.177659 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:22:58.177684 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:22:58.177707 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:22:58.177732 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:22:58.177754 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:22:58.177778 systemd[1]: Starting modprobe@drm.service... Dec 13 14:22:58.177802 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:22:58.177826 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:22:58.177852 systemd[1]: Starting modprobe@loop.service... Dec 13 14:22:58.177875 kernel: fuse: init (API version 7.34) Dec 13 14:22:58.177900 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:22:58.177924 kernel: loop: module loaded Dec 13 14:22:58.177946 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:22:58.177969 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:22:58.177993 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:22:58.178016 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:22:58.178039 systemd[1]: Stopped systemd-journald.service. Dec 13 14:22:58.178065 systemd[1]: Starting systemd-journald.service... Dec 13 14:22:58.178089 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:22:58.178112 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:22:58.178134 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:22:58.178162 systemd-journald[994]: Journal started Dec 13 14:22:58.178246 systemd-journald[994]: Runtime Journal (/run/log/journal/53dce008f0e5d859634ce9010a74270c) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:22:53.857000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:22:53.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:53.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:22:53.997000 audit: BPF prog-id=10 op=LOAD Dec 13 14:22:53.997000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:22:53.997000 audit: BPF prog-id=11 op=LOAD Dec 13 14:22:53.997000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:22:54.137000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:22:54.137000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:54.137000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:54.147000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:22:54.147000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:54.147000 audit: CWD cwd="/" Dec 13 14:22:54.147000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:54.147000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:54.147000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:22:57.248000 audit: BPF prog-id=12 op=LOAD Dec 13 14:22:57.248000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:22:57.253000 audit: BPF prog-id=13 op=LOAD Dec 13 14:22:57.260000 audit: BPF prog-id=14 op=LOAD Dec 13 14:22:57.260000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:22:57.260000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:22:57.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:57.331000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:22:57.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:57.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.127000 audit: BPF prog-id=15 op=LOAD Dec 13 14:22:58.127000 audit: BPF prog-id=16 op=LOAD Dec 13 14:22:58.127000 audit: BPF prog-id=17 op=LOAD Dec 13 14:22:58.127000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:22:58.127000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:22:58.171000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:22:58.171000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc849f2fd0 a2=4000 a3=7ffc849f306c items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:58.171000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:22:54.134403 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:22:57.247396 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:22:54.135533 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:57.263865 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:22:54.135569 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:54.135625 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:22:54.135646 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:22:54.135705 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:22:54.135730 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:22:54.136049 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:22:54.136131 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:22:54.136157 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:22:54.137307 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:22:54.137375 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:22:54.137411 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:22:54.137440 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:22:54.137472 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:22:54.137499 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:22:56.643721 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:56.644004 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:56.644181 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:56.644482 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:22:56.644546 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:22:56.644618 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-12-13T14:22:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:22:58.198323 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:22:58.212323 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:22:58.218335 systemd[1]: Stopped verity-setup.service. Dec 13 14:22:58.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.237321 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:22:58.246357 systemd[1]: Started systemd-journald.service. Dec 13 14:22:58.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.256980 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:22:58.264632 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:22:58.271571 systemd[1]: Mounted media.mount. Dec 13 14:22:58.278578 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:22:58.287622 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:22:58.296581 systemd[1]: Mounted tmp.mount. Dec 13 14:22:58.303720 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:22:58.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.312846 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:22:58.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.321819 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:22:58.322043 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:22:58.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.330871 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:22:58.331087 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:22:58.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.339895 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:22:58.340106 systemd[1]: Finished modprobe@drm.service. Dec 13 14:22:58.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.348875 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:22:58.349084 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:22:58.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.357856 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:22:58.358059 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:22:58.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.366814 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:22:58.367016 systemd[1]: Finished modprobe@loop.service. Dec 13 14:22:58.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.375866 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:22:58.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.384760 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:22:58.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.393796 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:22:58.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.402811 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:22:58.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.412158 systemd[1]: Reached target network-pre.target. Dec 13 14:22:58.421938 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:22:58.431752 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:22:58.438448 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:22:58.441800 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:22:58.450327 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:22:58.458456 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:22:58.460175 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:22:58.462215 systemd-journald[994]: Time spent on flushing to /var/log/journal/53dce008f0e5d859634ce9010a74270c is 71.472ms for 1150 entries. Dec 13 14:22:58.462215 systemd-journald[994]: System Journal (/var/log/journal/53dce008f0e5d859634ce9010a74270c) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:22:58.570020 systemd-journald[994]: Received client request to flush runtime journal. Dec 13 14:22:58.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:58.475506 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:22:58.477366 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:22:58.486594 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:22:58.572800 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:22:58.495189 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:22:58.505807 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:22:58.514634 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:22:58.524766 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:22:58.533888 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:22:58.547184 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:22:58.557006 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:22:58.571342 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:22:58.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.159802 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:22:59.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.167000 audit: BPF prog-id=18 op=LOAD Dec 13 14:22:59.168000 audit: BPF prog-id=19 op=LOAD Dec 13 14:22:59.168000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:22:59.168000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:22:59.170357 systemd[1]: Starting systemd-udevd.service... Dec 13 14:22:59.193782 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Dec 13 14:22:59.239908 systemd[1]: Started systemd-udevd.service. Dec 13 14:22:59.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.249000 audit: BPF prog-id=20 op=LOAD Dec 13 14:22:59.251695 systemd[1]: Starting systemd-networkd.service... Dec 13 14:22:59.265000 audit: BPF prog-id=21 op=LOAD Dec 13 14:22:59.265000 audit: BPF prog-id=22 op=LOAD Dec 13 14:22:59.265000 audit: BPF prog-id=23 op=LOAD Dec 13 14:22:59.267691 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:22:59.323405 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:22:59.327142 systemd[1]: Started systemd-userdbd.service. Dec 13 14:22:59.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.446321 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1019) Dec 13 14:22:59.473912 systemd-networkd[1024]: lo: Link UP Dec 13 14:22:59.473926 systemd-networkd[1024]: lo: Gained carrier Dec 13 14:22:59.474743 systemd-networkd[1024]: Enumeration completed Dec 13 14:22:59.474883 systemd[1]: Started systemd-networkd.service. Dec 13 14:22:59.476607 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:22:59.478586 systemd-networkd[1024]: eth0: Link UP Dec 13 14:22:59.478605 systemd-networkd[1024]: eth0: Gained carrier Dec 13 14:22:59.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.486506 systemd-networkd[1024]: eth0: DHCPv4 address 10.128.0.77/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:22:59.511397 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:22:59.528000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:22:59.528000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5609b7cdc9f0 a1=337fc a2=7ff124720bc5 a3=5 items=110 ppid=1011 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:59.528000 audit: CWD cwd="/" Dec 13 14:22:59.528000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=1 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=2 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=3 name=(null) inode=13740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=4 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=5 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=6 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=7 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=8 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=9 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=10 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=11 name=(null) inode=13744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=12 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=13 name=(null) inode=13745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=14 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=15 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=16 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=17 name=(null) inode=13747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=18 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=19 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=20 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=21 name=(null) inode=13749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=22 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=23 name=(null) inode=13750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=24 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=25 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=26 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=27 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=28 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=29 name=(null) inode=13753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=30 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=31 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=32 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=33 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=34 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=35 name=(null) inode=13756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=36 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=37 name=(null) inode=13757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=38 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=39 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=40 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=41 name=(null) inode=13759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=42 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=43 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=44 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=45 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=46 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=47 name=(null) inode=13762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=48 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=49 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=50 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=51 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=52 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=53 name=(null) inode=13765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=55 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=56 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=57 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=58 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=59 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=60 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=61 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=62 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=63 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=64 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=65 name=(null) inode=13771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=66 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=67 name=(null) inode=13772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=68 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=69 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=70 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=71 name=(null) inode=13774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=72 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=73 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=74 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=75 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=76 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=77 name=(null) inode=13777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=78 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=79 name=(null) inode=13778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=80 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=81 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=82 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=83 name=(null) inode=13780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=84 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=85 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=86 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=87 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=88 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=89 name=(null) inode=13783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=90 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=91 name=(null) inode=13784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=92 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=93 name=(null) inode=13785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=94 name=(null) inode=13781 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=95 name=(null) inode=13786 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=96 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=97 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=98 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=99 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=100 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=101 name=(null) inode=13789 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=102 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=103 name=(null) inode=13790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=104 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=105 name=(null) inode=13791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=106 name=(null) inode=13787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=107 name=(null) inode=13792 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PATH item=109 name=(null) inode=13793 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:22:59.528000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:22:59.568329 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:22:59.615900 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:22:59.615946 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:22:59.615988 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:22:59.610331 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:22:59.630317 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:22:59.647323 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:22:59.659338 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:22:59.680886 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:22:59.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.691213 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:22:59.719378 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:59.746641 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:22:59.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.755665 systemd[1]: Reached target cryptsetup.target. Dec 13 14:22:59.766004 systemd[1]: Starting lvm2-activation.service... Dec 13 14:22:59.771663 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:22:59.797661 systemd[1]: Finished lvm2-activation.service. Dec 13 14:22:59.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.806650 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:22:59.815471 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:22:59.815532 systemd[1]: Reached target local-fs.target. Dec 13 14:22:59.823471 systemd[1]: Reached target machines.target. Dec 13 14:22:59.833027 systemd[1]: Starting ldconfig.service... Dec 13 14:22:59.841350 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:22:59.841444 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:22:59.843114 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:22:59.852126 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:22:59.862831 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:22:59.872991 systemd[1]: Starting systemd-sysext.service... Dec 13 14:22:59.881053 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Dec 13 14:22:59.883134 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:22:59.899528 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:22:59.907560 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:22:59.907869 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:22:59.935893 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:22:59.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:59.936473 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:23:00.047585 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) Dec 13 14:23:00.047585 systemd-fsck[1065]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:23:00.047669 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:23:00.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.059618 systemd[1]: Mounting boot.mount... Dec 13 14:23:00.105509 systemd[1]: Mounted boot.mount. Dec 13 14:23:00.128527 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:23:00.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.293112 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:23:00.293973 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:23:00.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.323345 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:23:00.347384 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:23:00.371229 (sd-sysext)[1069]: Using extensions 'kubernetes'. Dec 13 14:23:00.372459 (sd-sysext)[1069]: Merged extensions into '/usr'. Dec 13 14:23:00.398074 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:00.400941 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:23:00.409714 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:23:00.412377 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:00.422263 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:00.431192 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:00.438557 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:00.438803 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:00.439016 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:00.444120 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:23:00.446216 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:23:00.453017 systemd[1]: Finished ldconfig.service. Dec 13 14:23:00.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.461035 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:00.461257 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:00.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.470144 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:00.470413 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:00.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.479148 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:00.479394 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:00.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.488348 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:00.488511 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:00.489960 systemd[1]: Finished systemd-sysext.service. Dec 13 14:23:00.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.500145 systemd[1]: Starting ensure-sysext.service... Dec 13 14:23:00.508798 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:23:00.521090 systemd[1]: Reloading. Dec 13 14:23:00.538590 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:23:00.546112 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:23:00.561007 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:23:00.633490 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2024-12-13T14:23:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:00.634084 /usr/lib/systemd/system-generators/torcx-generator[1095]: time="2024-12-13T14:23:00Z" level=info msg="torcx already run" Dec 13 14:23:00.639464 systemd-networkd[1024]: eth0: Gained IPv6LL Dec 13 14:23:00.789201 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:00.789502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:00.821501 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:00.897000 audit: BPF prog-id=24 op=LOAD Dec 13 14:23:00.897000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:23:00.899000 audit: BPF prog-id=25 op=LOAD Dec 13 14:23:00.899000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:23:00.899000 audit: BPF prog-id=26 op=LOAD Dec 13 14:23:00.900000 audit: BPF prog-id=27 op=LOAD Dec 13 14:23:00.900000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:23:00.900000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:23:00.901000 audit: BPF prog-id=28 op=LOAD Dec 13 14:23:00.901000 audit: BPF prog-id=29 op=LOAD Dec 13 14:23:00.901000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:23:00.901000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:23:00.903000 audit: BPF prog-id=30 op=LOAD Dec 13 14:23:00.903000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:23:00.903000 audit: BPF prog-id=31 op=LOAD Dec 13 14:23:00.903000 audit: BPF prog-id=32 op=LOAD Dec 13 14:23:00.903000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:23:00.903000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:23:00.912159 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:23:00.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.926427 systemd[1]: Starting audit-rules.service... Dec 13 14:23:00.935145 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:23:00.945578 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:23:00.957534 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:23:00.966000 audit: BPF prog-id=33 op=LOAD Dec 13 14:23:00.969427 systemd[1]: Starting systemd-resolved.service... Dec 13 14:23:00.976000 audit: BPF prog-id=34 op=LOAD Dec 13 14:23:00.979489 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:23:00.988461 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:23:00.994000 audit[1168]: SYSTEM_BOOT pid=1168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:23:00.997742 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:23:01.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:01.008244 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:23:01.008524 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:23:01.011218 augenrules[1171]: No rules Dec 13 14:23:01.009000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:23:01.009000 audit[1171]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca4b849c0 a2=420 a3=0 items=0 ppid=1141 pid=1171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:01.009000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:23:01.017040 systemd[1]: Finished audit-rules.service. Dec 13 14:23:01.024878 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:23:01.040030 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:01.040586 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.043076 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:01.052616 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:01.062690 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:01.072673 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:23:01.079154 enable-oslogin[1179]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:23:01.082179 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.082572 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:01.085438 systemd[1]: Starting systemd-update-done.service... Dec 13 14:23:01.092422 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:23:01.092736 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:01.097985 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:01.099380 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:01.109495 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:01.109708 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:01.119479 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:01.119691 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:01.129573 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:23:01.129821 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:23:01.139360 systemd[1]: Finished systemd-update-done.service. Dec 13 14:23:01.149796 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:01.150100 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.154814 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:01.155249 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.158905 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:01.164992 systemd-resolved[1159]: Positive Trust Anchors: Dec 13 14:23:01.165018 systemd-resolved[1159]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:23:01.165074 systemd-resolved[1159]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:23:01.168331 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:01.177051 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:01.182784 systemd-resolved[1159]: Defaulting to hostname 'linux'. Dec 13 14:23:01.186303 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:23:01.191916 enable-oslogin[1184]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:23:01.194496 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.194754 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:01.194946 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:23:01.195093 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:01.197019 systemd[1]: Started systemd-resolved.service. Dec 13 14:23:01.206191 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:23:01.216064 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:01.216266 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:01.224932 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:01.225099 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:01.232455 systemd-timesyncd[1165]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:23:01.232531 systemd-timesyncd[1165]: Initial clock synchronization to Fri 2024-12-13 14:23:00.883110 UTC. Dec 13 14:23:01.233825 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:23:01.243467 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:01.243622 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:01.253000 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:23:01.253176 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:23:01.262264 systemd[1]: Reached target network.target. Dec 13 14:23:01.271573 systemd[1]: Reached target nss-lookup.target. Dec 13 14:23:01.280592 systemd[1]: Reached target time-set.target. Dec 13 14:23:01.289589 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:01.289847 systemd[1]: Reached target sysinit.target. Dec 13 14:23:01.298749 systemd[1]: Started motdgen.path. Dec 13 14:23:01.305695 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:23:01.315857 systemd[1]: Started logrotate.timer. Dec 13 14:23:01.322779 systemd[1]: Started mdadm.timer. Dec 13 14:23:01.329615 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:23:01.338590 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:23:01.338804 systemd[1]: Reached target paths.target. Dec 13 14:23:01.345585 systemd[1]: Reached target timers.target. Dec 13 14:23:01.353051 systemd[1]: Listening on dbus.socket. Dec 13 14:23:01.362206 systemd[1]: Starting docker.socket... Dec 13 14:23:01.373654 systemd[1]: Listening on sshd.socket. Dec 13 14:23:01.380705 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:01.381052 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.383935 systemd[1]: Listening on docker.socket. Dec 13 14:23:01.394178 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:23:01.394406 systemd[1]: Reached target sockets.target. Dec 13 14:23:01.402557 systemd[1]: Reached target basic.target. Dec 13 14:23:01.409555 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.409737 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:23:01.411649 systemd[1]: Starting containerd.service... Dec 13 14:23:01.420422 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:23:01.431645 systemd[1]: Starting dbus.service... Dec 13 14:23:01.440419 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:23:01.450827 systemd[1]: Starting extend-filesystems.service... Dec 13 14:23:01.456513 jq[1191]: false Dec 13 14:23:01.457461 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:23:01.459797 systemd[1]: Starting modprobe@drm.service... Dec 13 14:23:01.469544 systemd[1]: Starting motdgen.service... Dec 13 14:23:01.479513 systemd[1]: Starting prepare-helm.service... Dec 13 14:23:01.488554 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:23:01.498428 systemd[1]: Starting sshd-keygen.service... Dec 13 14:23:01.507611 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:23:01.516444 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:01.516720 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:23:01.517564 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:23:01.519055 systemd[1]: Starting update-engine.service... Dec 13 14:23:01.528931 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:23:01.534820 jq[1213]: true Dec 13 14:23:01.544938 extend-filesystems[1192]: Found loop1 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda1 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda2 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda3 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found usr Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda4 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda6 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda7 Dec 13 14:23:01.544938 extend-filesystems[1192]: Found sda9 Dec 13 14:23:01.851724 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:23:01.851784 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:23:01.543335 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:23:01.593040 dbus-daemon[1190]: [system] SELinux support is enabled Dec 13 14:23:01.852500 update_engine[1212]: I1213 14:23:01.683456 1212 main.cc:92] Flatcar Update Engine starting Dec 13 14:23:01.852500 update_engine[1212]: I1213 14:23:01.689386 1212 update_check_scheduler.cc:74] Next update check in 11m25s Dec 13 14:23:01.852837 extend-filesystems[1192]: Checking size of /dev/sda9 Dec 13 14:23:01.852837 extend-filesystems[1192]: Resized partition /dev/sda9 Dec 13 14:23:01.543613 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:23:01.596983 dbus-daemon[1190]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:23:01.868487 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:23:01.868487 extend-filesystems[1226]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:23:01.868487 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:23:01.868487 extend-filesystems[1226]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:23:01.915506 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:23:01.544760 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:23:01.915689 tar[1217]: linux-amd64/helm Dec 13 14:23:01.634705 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:23:01.916395 extend-filesystems[1192]: Resized filesystem in /dev/sda9 Dec 13 14:23:01.545034 systemd[1]: Finished modprobe@drm.service. Dec 13 14:23:01.924613 jq[1219]: true Dec 13 14:23:01.556779 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:23:01.925270 env[1220]: time="2024-12-13T14:23:01.826353076Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:23:01.557058 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:23:01.581953 systemd[1]: Starting systemd-logind.service... Dec 13 14:23:01.594719 systemd[1]: Started dbus.service. Dec 13 14:23:01.927069 bash[1248]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:23:01.605872 systemd[1]: Finished ensure-sysext.service. Dec 13 14:23:01.615119 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:23:01.629174 systemd[1]: Reached target network-online.target. Dec 13 14:23:01.639684 systemd[1]: Starting kubelet.service... Dec 13 14:23:01.928601 mkfs.ext4[1253]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:23:01.928601 mkfs.ext4[1253]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:23:01.928601 mkfs.ext4[1253]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:23:01.928601 mkfs.ext4[1253]: Filesystem UUID: 3d1777de-224a-4663-8793-f7a77d7e821e Dec 13 14:23:01.928601 mkfs.ext4[1253]: Superblock backups stored on blocks: Dec 13 14:23:01.928601 mkfs.ext4[1253]: 32768, 98304, 163840, 229376 Dec 13 14:23:01.928601 mkfs.ext4[1253]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:23:01.928601 mkfs.ext4[1253]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:23:01.928601 mkfs.ext4[1253]: Creating journal (8192 blocks): done Dec 13 14:23:01.928601 mkfs.ext4[1253]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:23:01.672059 systemd[1]: Starting oem-gce.service... Dec 13 14:23:01.696469 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:23:01.696553 systemd[1]: Reached target system-config.target. Dec 13 14:23:01.705569 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:23:01.705614 systemd[1]: Reached target user-config.target. Dec 13 14:23:01.931034 umount[1263]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:23:01.715021 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:23:01.715268 systemd[1]: Finished motdgen.service. Dec 13 14:23:01.731996 systemd[1]: Started update-engine.service. Dec 13 14:23:01.761860 systemd[1]: Started locksmithd.service. Dec 13 14:23:01.785879 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:23:01.794151 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:23:01.794446 systemd[1]: Finished extend-filesystems.service. Dec 13 14:23:01.802953 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:23:01.926645 systemd-logind[1222]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:23:01.926681 systemd-logind[1222]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:23:01.926717 systemd-logind[1222]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:23:01.929690 systemd-logind[1222]: New seat seat0. Dec 13 14:23:01.959746 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:23:01.956891 systemd[1]: Started systemd-logind.service. Dec 13 14:23:02.097680 env[1220]: time="2024-12-13T14:23:02.097612348Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:23:02.097867 env[1220]: time="2024-12-13T14:23:02.097837744Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.103720 env[1220]: time="2024-12-13T14:23:02.103612857Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:23:02.103720 env[1220]: time="2024-12-13T14:23:02.103661882Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104022 env[1220]: time="2024-12-13T14:23:02.103985850Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104091 env[1220]: time="2024-12-13T14:23:02.104025431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104091 env[1220]: time="2024-12-13T14:23:02.104046992Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:23:02.104091 env[1220]: time="2024-12-13T14:23:02.104066156Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104245 env[1220]: time="2024-12-13T14:23:02.104179280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104565 env[1220]: time="2024-12-13T14:23:02.104534634Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104823 env[1220]: time="2024-12-13T14:23:02.104790349Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:23:02.104888 env[1220]: time="2024-12-13T14:23:02.104825282Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:23:02.104946 env[1220]: time="2024-12-13T14:23:02.104903051Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:23:02.104946 env[1220]: time="2024-12-13T14:23:02.104923916Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:23:02.117696 coreos-metadata[1189]: Dec 13 14:23:02.117 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:23:02.122943 env[1220]: time="2024-12-13T14:23:02.122878794Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:23:02.123082 env[1220]: time="2024-12-13T14:23:02.122951758Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:23:02.123082 env[1220]: time="2024-12-13T14:23:02.122971975Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:23:02.123082 env[1220]: time="2024-12-13T14:23:02.123042113Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123224 env[1220]: time="2024-12-13T14:23:02.123126946Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123224 env[1220]: time="2024-12-13T14:23:02.123170697Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123224 env[1220]: time="2024-12-13T14:23:02.123194041Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123401 env[1220]: time="2024-12-13T14:23:02.123233362Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123401 env[1220]: time="2024-12-13T14:23:02.123256009Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123401 env[1220]: time="2024-12-13T14:23:02.123277984Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123401 env[1220]: time="2024-12-13T14:23:02.123326428Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.123401 env[1220]: time="2024-12-13T14:23:02.123352783Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:23:02.123614 env[1220]: time="2024-12-13T14:23:02.123567310Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:23:02.123758 env[1220]: time="2024-12-13T14:23:02.123733525Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:23:02.124375 env[1220]: time="2024-12-13T14:23:02.124345022Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:23:02.124471 env[1220]: time="2024-12-13T14:23:02.124411535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.124471 env[1220]: time="2024-12-13T14:23:02.124436714Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:23:02.124640 env[1220]: time="2024-12-13T14:23:02.124541164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.124701 env[1220]: time="2024-12-13T14:23:02.124656384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.124701 env[1220]: time="2024-12-13T14:23:02.124678521Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128089 env[1220]: time="2024-12-13T14:23:02.124698354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128205 env[1220]: time="2024-12-13T14:23:02.128110122Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128205 env[1220]: time="2024-12-13T14:23:02.128157402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128205 env[1220]: time="2024-12-13T14:23:02.128179406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128430 env[1220]: time="2024-12-13T14:23:02.128239262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128430 env[1220]: time="2024-12-13T14:23:02.128268336Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:23:02.128737 env[1220]: time="2024-12-13T14:23:02.128708663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128817 env[1220]: time="2024-12-13T14:23:02.128763130Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128817 env[1220]: time="2024-12-13T14:23:02.128787953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.128817 env[1220]: time="2024-12-13T14:23:02.128809798Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:23:02.128954 env[1220]: time="2024-12-13T14:23:02.128854965Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:23:02.128954 env[1220]: time="2024-12-13T14:23:02.128876002Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:23:02.128954 env[1220]: time="2024-12-13T14:23:02.128920093Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:23:02.129108 env[1220]: time="2024-12-13T14:23:02.128970919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:23:02.138265 coreos-metadata[1189]: Dec 13 14:23:02.138 INFO Fetch failed with 404: resource not found Dec 13 14:23:02.138395 coreos-metadata[1189]: Dec 13 14:23:02.138 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:23:02.140698 coreos-metadata[1189]: Dec 13 14:23:02.140 INFO Fetch successful Dec 13 14:23:02.140807 coreos-metadata[1189]: Dec 13 14:23:02.140 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:23:02.141539 coreos-metadata[1189]: Dec 13 14:23:02.141 INFO Fetch failed with 404: resource not found Dec 13 14:23:02.141628 coreos-metadata[1189]: Dec 13 14:23:02.141 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:23:02.142328 coreos-metadata[1189]: Dec 13 14:23:02.142 INFO Fetch failed with 404: resource not found Dec 13 14:23:02.142412 coreos-metadata[1189]: Dec 13 14:23:02.142 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:23:02.144084 env[1220]: time="2024-12-13T14:23:02.143978668Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:23:02.147599 env[1220]: time="2024-12-13T14:23:02.144096579Z" level=info msg="Connect containerd service" Dec 13 14:23:02.147599 env[1220]: time="2024-12-13T14:23:02.144159208Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:23:02.147721 coreos-metadata[1189]: Dec 13 14:23:02.146 INFO Fetch successful Dec 13 14:23:02.149897 unknown[1189]: wrote ssh authorized keys file for user: core Dec 13 14:23:02.156459 env[1220]: time="2024-12-13T14:23:02.156377102Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:23:02.159497 env[1220]: time="2024-12-13T14:23:02.159435034Z" level=info msg="Start subscribing containerd event" Dec 13 14:23:02.160106 env[1220]: time="2024-12-13T14:23:02.160071573Z" level=info msg="Start recovering state" Dec 13 14:23:02.160324 env[1220]: time="2024-12-13T14:23:02.160287108Z" level=info msg="Start event monitor" Dec 13 14:23:02.160425 env[1220]: time="2024-12-13T14:23:02.160407886Z" level=info msg="Start snapshots syncer" Dec 13 14:23:02.163089 env[1220]: time="2024-12-13T14:23:02.163059812Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:23:02.165503 env[1220]: time="2024-12-13T14:23:02.165473951Z" level=info msg="Start streaming server" Dec 13 14:23:02.166254 env[1220]: time="2024-12-13T14:23:02.166227974Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:23:02.166710 env[1220]: time="2024-12-13T14:23:02.166677798Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:23:02.167004 systemd[1]: Started containerd.service. Dec 13 14:23:02.185192 update-ssh-keys[1270]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:23:02.185984 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:23:02.194409 env[1220]: time="2024-12-13T14:23:02.194359690Z" level=info msg="containerd successfully booted in 0.400210s" Dec 13 14:23:02.236901 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:23:02.237097 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:23:02.237704 dbus-daemon[1190]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1256 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:23:02.250176 systemd[1]: Starting polkit.service... Dec 13 14:23:02.341270 polkitd[1271]: Started polkitd version 121 Dec 13 14:23:02.369088 polkitd[1271]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:23:02.369599 polkitd[1271]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:23:02.377791 polkitd[1271]: Finished loading, compiling and executing 2 rules Dec 13 14:23:02.381321 dbus-daemon[1190]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:23:02.381549 systemd[1]: Started polkit.service. Dec 13 14:23:02.382135 polkitd[1271]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:23:02.427956 systemd-hostnamed[1256]: Hostname set to (transient) Dec 13 14:23:02.430773 systemd-resolved[1159]: System hostname changed to 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal'. Dec 13 14:23:02.878681 systemd[1]: Created slice system-sshd.slice. Dec 13 14:23:03.306164 tar[1217]: linux-amd64/LICENSE Dec 13 14:23:03.306685 tar[1217]: linux-amd64/README.md Dec 13 14:23:03.320100 systemd[1]: Finished prepare-helm.service. Dec 13 14:23:03.721749 systemd[1]: Started kubelet.service. Dec 13 14:23:04.594082 locksmithd[1254]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:23:04.960088 kubelet[1282]: E1213 14:23:04.960033 1282 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:23:04.962847 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:23:04.963096 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:23:04.963493 systemd[1]: kubelet.service: Consumed 1.442s CPU time. Dec 13 14:23:08.350146 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:23:09.318237 sshd_keygen[1216]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:23:09.357820 systemd[1]: Finished sshd-keygen.service. Dec 13 14:23:09.369814 systemd[1]: Starting issuegen.service... Dec 13 14:23:09.378460 systemd[1]: Started sshd@0-10.128.0.77:22-139.178.68.195:53086.service. Dec 13 14:23:09.390779 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:23:09.391069 systemd[1]: Finished issuegen.service. Dec 13 14:23:09.401043 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:23:09.413168 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:23:09.423742 systemd[1]: Started getty@tty1.service. Dec 13 14:23:09.432706 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:23:09.441917 systemd[1]: Reached target getty.target. Dec 13 14:23:09.693306 sshd[1303]: Accepted publickey for core from 139.178.68.195 port 53086 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:09.697784 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:09.719914 systemd[1]: Created slice user-500.slice. Dec 13 14:23:09.728343 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:23:09.738827 systemd-logind[1222]: New session 1 of user core. Dec 13 14:23:09.802076 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:23:09.812794 systemd[1]: Starting user@500.service... Dec 13 14:23:09.831822 (systemd)[1309]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:09.997282 systemd[1309]: Queued start job for default target default.target. Dec 13 14:23:09.998089 systemd[1309]: Reached target paths.target. Dec 13 14:23:09.998132 systemd[1309]: Reached target sockets.target. Dec 13 14:23:09.998156 systemd[1309]: Reached target timers.target. Dec 13 14:23:09.998178 systemd[1309]: Reached target basic.target. Dec 13 14:23:09.998254 systemd[1309]: Reached target default.target. Dec 13 14:23:09.998347 systemd[1309]: Startup finished in 157ms. Dec 13 14:23:09.998827 systemd[1]: Started user@500.service. Dec 13 14:23:10.007103 systemd[1]: Started session-1.scope. Dec 13 14:23:10.245487 systemd[1]: Started sshd@1-10.128.0.77:22-139.178.68.195:35618.service. Dec 13 14:23:10.519329 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:23:10.543452 systemd-nspawn[1320]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:23:10.543452 systemd-nspawn[1320]: Press ^] three times within 1s to kill container. Dec 13 14:23:10.545559 sshd[1318]: Accepted publickey for core from 139.178.68.195 port 35618 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:10.547873 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:10.556102 systemd[1]: Started session-2.scope. Dec 13 14:23:10.557563 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:23:10.556792 systemd-logind[1222]: New session 2 of user core. Dec 13 14:23:10.585093 systemd[1]: tmp-unifiedlq8yDB.mount: Deactivated successfully. Dec 13 14:23:10.648611 systemd[1]: Started oem-gce.service. Dec 13 14:23:10.655932 systemd[1]: Reached target multi-user.target. Dec 13 14:23:10.667607 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:23:10.681051 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:23:10.681341 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:23:10.691624 systemd[1]: Startup finished in 976ms (kernel) + 7.939s (initrd) + 16.952s (userspace) = 25.868s. Dec 13 14:23:10.711479 systemd-nspawn[1320]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:23:10.711479 systemd-nspawn[1320]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:23:10.711479 systemd-nspawn[1320]: + /usr/bin/google_instance_setup Dec 13 14:23:10.760782 sshd[1318]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:10.765851 systemd[1]: sshd@1-10.128.0.77:22-139.178.68.195:35618.service: Deactivated successfully. Dec 13 14:23:10.766984 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:23:10.767860 systemd-logind[1222]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:23:10.769184 systemd-logind[1222]: Removed session 2. Dec 13 14:23:10.805845 systemd[1]: Started sshd@2-10.128.0.77:22-139.178.68.195:35632.service. Dec 13 14:23:11.111751 sshd[1331]: Accepted publickey for core from 139.178.68.195 port 35632 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:11.112638 sshd[1331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:11.120211 systemd[1]: Started session-3.scope. Dec 13 14:23:11.120848 systemd-logind[1222]: New session 3 of user core. Dec 13 14:23:11.318770 sshd[1331]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:11.323825 systemd[1]: sshd@2-10.128.0.77:22-139.178.68.195:35632.service: Deactivated successfully. Dec 13 14:23:11.324975 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:23:11.326177 systemd-logind[1222]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:23:11.327915 systemd-logind[1222]: Removed session 3. Dec 13 14:23:11.335792 instance-setup[1328]: INFO Running google_set_multiqueue. Dec 13 14:23:11.349266 instance-setup[1328]: INFO Set channels for eth0 to 2. Dec 13 14:23:11.352938 instance-setup[1328]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:23:11.354332 instance-setup[1328]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:23:11.354775 instance-setup[1328]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:23:11.356286 instance-setup[1328]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:23:11.356737 instance-setup[1328]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:23:11.365160 systemd[1]: Started sshd@3-10.128.0.77:22-139.178.68.195:35636.service. Dec 13 14:23:11.368456 instance-setup[1328]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:23:11.368637 instance-setup[1328]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:23:11.368762 instance-setup[1328]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:23:11.384908 instance-setup[1328]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:23:11.385082 instance-setup[1328]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:23:11.425117 systemd-nspawn[1320]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:23:11.661661 sshd[1361]: Accepted publickey for core from 139.178.68.195 port 35636 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:11.663161 sshd[1361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:11.671774 systemd[1]: Started session-4.scope. Dec 13 14:23:11.673368 systemd-logind[1222]: New session 4 of user core. Dec 13 14:23:11.769263 startup-script[1369]: INFO Starting startup scripts. Dec 13 14:23:11.781740 startup-script[1369]: INFO No startup scripts found in metadata. Dec 13 14:23:11.781899 startup-script[1369]: INFO Finished running startup scripts. Dec 13 14:23:11.813031 systemd-nspawn[1320]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:23:11.813031 systemd-nspawn[1320]: + daemon_pids=() Dec 13 14:23:11.813031 systemd-nspawn[1320]: + for d in accounts clock_skew network Dec 13 14:23:11.813739 systemd-nspawn[1320]: + daemon_pids+=($!) Dec 13 14:23:11.813739 systemd-nspawn[1320]: + for d in accounts clock_skew network Dec 13 14:23:11.813837 systemd-nspawn[1320]: + daemon_pids+=($!) Dec 13 14:23:11.813891 systemd-nspawn[1320]: + for d in accounts clock_skew network Dec 13 14:23:11.814148 systemd-nspawn[1320]: + daemon_pids+=($!) Dec 13 14:23:11.814316 systemd-nspawn[1320]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:23:11.814402 systemd-nspawn[1320]: + /usr/bin/systemd-notify --ready Dec 13 14:23:11.814584 systemd-nspawn[1320]: + /usr/bin/google_accounts_daemon Dec 13 14:23:11.815043 systemd-nspawn[1320]: + /usr/bin/google_network_daemon Dec 13 14:23:11.815229 systemd-nspawn[1320]: + /usr/bin/google_clock_skew_daemon Dec 13 14:23:11.871700 systemd-nspawn[1320]: + wait -n 36 37 38 Dec 13 14:23:11.878349 sshd[1361]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:11.884972 systemd[1]: sshd@3-10.128.0.77:22-139.178.68.195:35636.service: Deactivated successfully. Dec 13 14:23:11.886090 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:23:11.888702 systemd-logind[1222]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:23:11.890733 systemd-logind[1222]: Removed session 4. Dec 13 14:23:11.928398 systemd[1]: Started sshd@4-10.128.0.77:22-139.178.68.195:35650.service. Dec 13 14:23:12.238801 sshd[1380]: Accepted publickey for core from 139.178.68.195 port 35650 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:12.239832 sshd[1380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:12.247720 systemd[1]: Started session-5.scope. Dec 13 14:23:12.248583 systemd-logind[1222]: New session 5 of user core. Dec 13 14:23:12.444079 sudo[1387]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:23:12.444574 sudo[1387]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:23:12.458997 dbus-daemon[1190]: Э*\u0014&V: received setenforce notice (enforcing=-698768624) Dec 13 14:23:12.459249 sudo[1387]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:12.473990 google-networking[1375]: INFO Starting Google Networking daemon. Dec 13 14:23:12.506653 sshd[1380]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:12.512075 systemd[1]: sshd@4-10.128.0.77:22-139.178.68.195:35650.service: Deactivated successfully. Dec 13 14:23:12.513227 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:23:12.515121 systemd-logind[1222]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:23:12.516725 systemd-logind[1222]: Removed session 5. Dec 13 14:23:12.551769 systemd[1]: Started sshd@5-10.128.0.77:22-139.178.68.195:35654.service. Dec 13 14:23:12.574055 google-clock-skew[1374]: INFO Starting Google Clock Skew daemon. Dec 13 14:23:12.588494 google-clock-skew[1374]: INFO Clock drift token has changed: 0. Dec 13 14:23:12.592976 systemd-nspawn[1320]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:23:12.593305 systemd-nspawn[1320]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:23:12.594635 google-clock-skew[1374]: WARNING Failed to sync system time with hardware clock. Dec 13 14:23:12.732373 groupadd[1397]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:23:12.735938 groupadd[1397]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:23:12.740926 groupadd[1397]: new group: name=google-sudoers, GID=1000 Dec 13 14:23:12.755972 google-accounts[1373]: INFO Starting Google Accounts daemon. Dec 13 14:23:12.780882 google-accounts[1373]: WARNING OS Login not installed. Dec 13 14:23:12.782118 google-accounts[1373]: INFO Creating a new user account for 0. Dec 13 14:23:12.787554 systemd-nspawn[1320]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:23:12.788180 google-accounts[1373]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:23:12.793373 google-accounts[1373]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' Dec 13 14:23:12.852399 sshd[1394]: Accepted publickey for core from 139.178.68.195 port 35654 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:12.854440 sshd[1394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:12.860687 systemd-logind[1222]: New session 6 of user core. Dec 13 14:23:12.861438 systemd[1]: Started session-6.scope. Dec 13 14:23:13.029963 sudo[1408]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:23:13.030399 sudo[1408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:23:13.034893 sudo[1408]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:13.047762 sudo[1407]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:23:13.048170 sudo[1407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:23:13.060789 systemd[1]: Stopping audit-rules.service... Dec 13 14:23:13.068332 kernel: kauditd_printk_skb: 203 callbacks suppressed Dec 13 14:23:13.068451 kernel: audit: type=1305 audit(1734099793.061:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:23:13.061000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:23:13.068615 auditctl[1411]: No rules Dec 13 14:23:13.069318 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:23:13.069571 systemd[1]: Stopped audit-rules.service. Dec 13 14:23:13.061000 audit[1411]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd1d5c3e0 a2=420 a3=0 items=0 ppid=1 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.084860 systemd[1]: Starting audit-rules.service... Dec 13 14:23:13.113330 kernel: audit: type=1300 audit(1734099793.061:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd1d5c3e0 a2=420 a3=0 items=0 ppid=1 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.061000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:23:13.122473 augenrules[1428]: No rules Dec 13 14:23:13.122833 kernel: audit: type=1327 audit(1734099793.061:184): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:23:13.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.123645 systemd[1]: Finished audit-rules.service. Dec 13 14:23:13.127169 sudo[1407]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:13.144416 kernel: audit: type=1131 audit(1734099793.067:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.144574 kernel: audit: type=1130 audit(1734099793.121:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.121000 audit[1407]: USER_END pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.166327 kernel: audit: type=1106 audit(1734099793.121:187): pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.172989 sshd[1394]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:13.178356 systemd[1]: sshd@5-10.128.0.77:22-139.178.68.195:35654.service: Deactivated successfully. Dec 13 14:23:13.179484 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:23:13.181258 systemd-logind[1222]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:23:13.183058 systemd-logind[1222]: Removed session 6. Dec 13 14:23:13.121000 audit[1407]: CRED_DISP pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.215760 kernel: audit: type=1104 audit(1734099793.121:188): pid=1407 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.215872 kernel: audit: type=1106 audit(1734099793.173:189): pid=1394 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.173000 audit[1394]: USER_END pid=1394 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.216914 systemd[1]: Started sshd@6-10.128.0.77:22-139.178.68.195:35660.service. Dec 13 14:23:13.173000 audit[1394]: CRED_DISP pid=1394 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.77:22-139.178.68.195:35654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.270319 kernel: audit: type=1104 audit(1734099793.173:190): pid=1394 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.270391 kernel: audit: type=1131 audit(1734099793.177:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.77:22-139.178.68.195:35654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.77:22-139.178.68.195:35660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.509000 audit[1434]: USER_ACCT pid=1434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.509737 sshd[1434]: Accepted publickey for core from 139.178.68.195 port 35660 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:23:13.510000 audit[1434]: CRED_ACQ pid=1434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.510000 audit[1434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc09ed7c0 a2=3 a3=0 items=0 ppid=1 pid=1434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.510000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:23:13.511758 sshd[1434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:23:13.518349 systemd[1]: Started session-7.scope. Dec 13 14:23:13.519103 systemd-logind[1222]: New session 7 of user core. Dec 13 14:23:13.524000 audit[1434]: USER_START pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.527000 audit[1436]: CRED_ACQ pid=1436 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:13.684000 audit[1437]: USER_ACCT pid=1437 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.684723 sudo[1437]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:23:13.684000 audit[1437]: CRED_REFR pid=1437 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.685162 sudo[1437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:23:13.687000 audit[1437]: USER_START pid=1437 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.717928 systemd[1]: Starting docker.service... Dec 13 14:23:13.765364 env[1447]: time="2024-12-13T14:23:13.764274635Z" level=info msg="Starting up" Dec 13 14:23:13.766799 env[1447]: time="2024-12-13T14:23:13.766752906Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:23:13.766799 env[1447]: time="2024-12-13T14:23:13.766781964Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:23:13.766995 env[1447]: time="2024-12-13T14:23:13.766809279Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:23:13.766995 env[1447]: time="2024-12-13T14:23:13.766824645Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:23:13.769440 env[1447]: time="2024-12-13T14:23:13.769397038Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:23:13.769440 env[1447]: time="2024-12-13T14:23:13.769419531Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:23:13.769610 env[1447]: time="2024-12-13T14:23:13.769442387Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:23:13.769610 env[1447]: time="2024-12-13T14:23:13.769455668Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:23:13.779457 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3274893240-merged.mount: Deactivated successfully. Dec 13 14:23:13.807797 env[1447]: time="2024-12-13T14:23:13.807730488Z" level=info msg="Loading containers: start." Dec 13 14:23:13.892000 audit[1478]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.892000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffa5f26eb0 a2=0 a3=7fffa5f26e9c items=0 ppid=1447 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:23:13.895000 audit[1480]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.895000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcdf735db0 a2=0 a3=7ffcdf735d9c items=0 ppid=1447 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:23:13.899000 audit[1482]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.899000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff8e85abb0 a2=0 a3=7fff8e85ab9c items=0 ppid=1447 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.899000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:23:13.903000 audit[1484]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.903000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc186804f0 a2=0 a3=7ffc186804dc items=0 ppid=1447 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:23:13.906000 audit[1486]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.906000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe38ccb350 a2=0 a3=7ffe38ccb33c items=0 ppid=1447 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:23:13.928000 audit[1491]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.928000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda4c00780 a2=0 a3=7ffda4c0076c items=0 ppid=1447 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:23:13.940000 audit[1493]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.940000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc19add540 a2=0 a3=7ffc19add52c items=0 ppid=1447 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:23:13.943000 audit[1495]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.943000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe2f6424e0 a2=0 a3=7ffe2f6424cc items=0 ppid=1447 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.943000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:23:13.946000 audit[1497]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.946000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc3c75aa70 a2=0 a3=7ffc3c75aa5c items=0 ppid=1447 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:23:13.957000 audit[1501]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.957000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc8aea65d0 a2=0 a3=7ffc8aea65bc items=0 ppid=1447 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:23:13.964000 audit[1502]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:13.964000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe9ae89f60 a2=0 a3=7ffe9ae89f4c items=0 ppid=1447 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:23:13.982331 kernel: Initializing XFRM netlink socket Dec 13 14:23:14.031149 env[1447]: time="2024-12-13T14:23:14.026880360Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:23:14.056000 audit[1510]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.056000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe1237eaf0 a2=0 a3=7ffe1237eadc items=0 ppid=1447 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.056000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:23:14.069000 audit[1513]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.069000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeb5384f70 a2=0 a3=7ffeb5384f5c items=0 ppid=1447 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.069000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:23:14.075000 audit[1516]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.075000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc0c1c1fb0 a2=0 a3=7ffc0c1c1f9c items=0 ppid=1447 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:23:14.079000 audit[1518]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.079000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa7af9cb0 a2=0 a3=7fffa7af9c9c items=0 ppid=1447 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:23:14.083000 audit[1520]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.083000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffca2bd57c0 a2=0 a3=7ffca2bd57ac items=0 ppid=1447 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:23:14.086000 audit[1522]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.086000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc6c5d8fa0 a2=0 a3=7ffc6c5d8f8c items=0 ppid=1447 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:23:14.089000 audit[1524]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.089000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe2b8c7060 a2=0 a3=7ffe2b8c704c items=0 ppid=1447 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:23:14.102000 audit[1527]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.102000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff74f042a0 a2=0 a3=7fff74f0428c items=0 ppid=1447 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:23:14.106000 audit[1529]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.106000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc963b7550 a2=0 a3=7ffc963b753c items=0 ppid=1447 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:23:14.109000 audit[1531]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.109000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffa94e9a10 a2=0 a3=7fffa94e99fc items=0 ppid=1447 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:23:14.113000 audit[1533]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.113000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdca0abe40 a2=0 a3=7ffdca0abe2c items=0 ppid=1447 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:23:14.114394 systemd-networkd[1024]: docker0: Link UP Dec 13 14:23:14.126000 audit[1537]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.126000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc898bfb60 a2=0 a3=7ffc898bfb4c items=0 ppid=1447 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:23:14.132000 audit[1538]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:14.132000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc4e369340 a2=0 a3=7ffc4e36932c items=0 ppid=1447 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:14.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:23:14.134173 env[1447]: time="2024-12-13T14:23:14.134125719Z" level=info msg="Loading containers: done." Dec 13 14:23:14.150266 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck855536988-merged.mount: Deactivated successfully. Dec 13 14:23:14.160802 env[1447]: time="2024-12-13T14:23:14.160748671Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:23:14.161056 env[1447]: time="2024-12-13T14:23:14.161037997Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:23:14.161279 env[1447]: time="2024-12-13T14:23:14.161245039Z" level=info msg="Daemon has completed initialization" Dec 13 14:23:14.181086 systemd[1]: Started docker.service. Dec 13 14:23:14.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:14.193645 env[1447]: time="2024-12-13T14:23:14.193574100Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:23:15.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:15.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:15.159972 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:23:15.160318 systemd[1]: Stopped kubelet.service. Dec 13 14:23:15.160416 systemd[1]: kubelet.service: Consumed 1.442s CPU time. Dec 13 14:23:15.167141 systemd[1]: Starting kubelet.service... Dec 13 14:23:15.175791 env[1220]: time="2024-12-13T14:23:15.175733749Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:23:15.414210 systemd[1]: Started kubelet.service. Dec 13 14:23:15.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:15.469746 kubelet[1573]: E1213 14:23:15.469671 1573 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:23:15.473698 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:23:15.473923 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:23:15.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:23:15.774243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3674492126.mount: Deactivated successfully. Dec 13 14:23:17.686068 env[1220]: time="2024-12-13T14:23:17.685985364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:17.689567 env[1220]: time="2024-12-13T14:23:17.689518855Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:17.695311 env[1220]: time="2024-12-13T14:23:17.695244754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:17.701506 env[1220]: time="2024-12-13T14:23:17.701450424Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:17.702196 env[1220]: time="2024-12-13T14:23:17.702150451Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 14:23:17.706185 env[1220]: time="2024-12-13T14:23:17.706131925Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:23:19.487045 env[1220]: time="2024-12-13T14:23:19.486972402Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:19.489760 env[1220]: time="2024-12-13T14:23:19.489699758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:19.492312 env[1220]: time="2024-12-13T14:23:19.492246077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:19.494712 env[1220]: time="2024-12-13T14:23:19.494671077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:19.495762 env[1220]: time="2024-12-13T14:23:19.495709301Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 14:23:19.497381 env[1220]: time="2024-12-13T14:23:19.497332060Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:23:21.206330 env[1220]: time="2024-12-13T14:23:21.206257762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:21.211981 env[1220]: time="2024-12-13T14:23:21.211929913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:21.215861 env[1220]: time="2024-12-13T14:23:21.215813844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:21.218568 env[1220]: time="2024-12-13T14:23:21.218524297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:21.219654 env[1220]: time="2024-12-13T14:23:21.219601950Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 14:23:21.220582 env[1220]: time="2024-12-13T14:23:21.220551685Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:23:22.543949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2775269073.mount: Deactivated successfully. Dec 13 14:23:23.298039 env[1220]: time="2024-12-13T14:23:23.297962628Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:23.300646 env[1220]: time="2024-12-13T14:23:23.300600268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:23.302674 env[1220]: time="2024-12-13T14:23:23.302621401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:23.304785 env[1220]: time="2024-12-13T14:23:23.304748343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:23.305473 env[1220]: time="2024-12-13T14:23:23.305426451Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:23:23.306240 env[1220]: time="2024-12-13T14:23:23.306207271Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:23:23.751230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1615334129.mount: Deactivated successfully. Dec 13 14:23:25.086925 env[1220]: time="2024-12-13T14:23:25.086838255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.089671 env[1220]: time="2024-12-13T14:23:25.089612050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.093071 env[1220]: time="2024-12-13T14:23:25.093009794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.095688 env[1220]: time="2024-12-13T14:23:25.095635227Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.096908 env[1220]: time="2024-12-13T14:23:25.096843175Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:23:25.097950 env[1220]: time="2024-12-13T14:23:25.097895279Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:23:25.518031 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:23:25.518191 kernel: audit: type=1130 audit(1734099805.487:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.488492 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:23:25.488762 systemd[1]: Stopped kubelet.service. Dec 13 14:23:25.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.540373 kernel: audit: type=1131 audit(1734099805.496:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.522834 systemd[1]: Starting kubelet.service... Dec 13 14:23:25.540603 env[1220]: time="2024-12-13T14:23:25.529055614Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.528193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1514404644.mount: Deactivated successfully. Dec 13 14:23:25.548228 env[1220]: time="2024-12-13T14:23:25.548152296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.561396 env[1220]: time="2024-12-13T14:23:25.561332265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.643657 env[1220]: time="2024-12-13T14:23:25.642752432Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:25.643657 env[1220]: time="2024-12-13T14:23:25.643192618Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 14:23:25.646008 env[1220]: time="2024-12-13T14:23:25.645691433Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:23:25.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.789248 systemd[1]: Started kubelet.service. Dec 13 14:23:25.812363 kernel: audit: type=1130 audit(1734099805.788:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:25.865120 kubelet[1582]: E1213 14:23:25.865054 1582 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:23:25.867649 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:23:25.867880 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:23:25.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:23:25.890350 kernel: audit: type=1131 audit(1734099805.866:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:23:26.544683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4015831054.mount: Deactivated successfully. Dec 13 14:23:29.221202 env[1220]: time="2024-12-13T14:23:29.221118186Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:29.224421 env[1220]: time="2024-12-13T14:23:29.224376033Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:29.227092 env[1220]: time="2024-12-13T14:23:29.227051269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:29.230357 env[1220]: time="2024-12-13T14:23:29.230311295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:29.235600 env[1220]: time="2024-12-13T14:23:29.235550549Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 14:23:32.443449 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:23:32.467483 kernel: audit: type=1131 audit(1734099812.442:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:32.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:32.491000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:23:32.505986 kernel: audit: type=1334 audit(1734099812.491:235): prog-id=41 op=UNLOAD Dec 13 14:23:32.506072 kernel: audit: type=1334 audit(1734099812.491:236): prog-id=40 op=UNLOAD Dec 13 14:23:32.491000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:23:32.513393 kernel: audit: type=1334 audit(1734099812.491:237): prog-id=39 op=UNLOAD Dec 13 14:23:32.491000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:23:33.958276 systemd[1]: Stopped kubelet.service. Dec 13 14:23:33.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:33.962522 systemd[1]: Starting kubelet.service... Dec 13 14:23:33.981323 kernel: audit: type=1130 audit(1734099813.958:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:33.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:34.004358 kernel: audit: type=1131 audit(1734099813.958:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:34.031722 systemd[1]: Reloading. Dec 13 14:23:34.176905 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2024-12-13T14:23:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:34.176956 /usr/lib/systemd/system-generators/torcx-generator[1634]: time="2024-12-13T14:23:34Z" level=info msg="torcx already run" Dec 13 14:23:34.294912 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:34.294946 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:34.318927 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.432312 kernel: audit: type=1400 audit(1734099814.410:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.474221 kernel: audit: type=1400 audit(1734099814.410:241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.474397 kernel: audit: type=1400 audit(1734099814.410:242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.430000 audit: BPF prog-id=43 op=LOAD Dec 13 14:23:34.430000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496314 kernel: audit: type=1400 audit(1734099814.410:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.452000 audit: BPF prog-id=44 op=LOAD Dec 13 14:23:34.452000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.472000 audit: BPF prog-id=45 op=LOAD Dec 13 14:23:34.472000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit: BPF prog-id=46 op=LOAD Dec 13 14:23:34.496000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit: BPF prog-id=47 op=LOAD Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.496000 audit: BPF prog-id=48 op=LOAD Dec 13 14:23:34.496000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:23:34.496000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit: BPF prog-id=49 op=LOAD Dec 13 14:23:34.497000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit: BPF prog-id=50 op=LOAD Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.497000 audit: BPF prog-id=51 op=LOAD Dec 13 14:23:34.497000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:23:34.497000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit: BPF prog-id=52 op=LOAD Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.523000 audit: BPF prog-id=53 op=LOAD Dec 13 14:23:34.523000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:23:34.523000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.525000 audit: BPF prog-id=54 op=LOAD Dec 13 14:23:34.525000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit: BPF prog-id=55 op=LOAD Dec 13 14:23:34.526000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit: BPF prog-id=56 op=LOAD Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:34.526000 audit: BPF prog-id=57 op=LOAD Dec 13 14:23:34.526000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:23:34.526000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:23:34.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:34.554471 systemd[1]: Started kubelet.service. Dec 13 14:23:34.557967 systemd[1]: Stopping kubelet.service... Dec 13 14:23:34.558568 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:23:34.558833 systemd[1]: Stopped kubelet.service. Dec 13 14:23:34.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:34.561526 systemd[1]: Starting kubelet.service... Dec 13 14:23:34.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:34.757488 systemd[1]: Started kubelet.service. Dec 13 14:23:34.821930 kubelet[1686]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:34.821930 kubelet[1686]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:23:34.821930 kubelet[1686]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:34.823734 kubelet[1686]: I1213 14:23:34.823664 1686 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:23:35.457850 kubelet[1686]: I1213 14:23:35.457799 1686 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:23:35.457850 kubelet[1686]: I1213 14:23:35.457842 1686 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:23:35.458515 kubelet[1686]: I1213 14:23:35.458486 1686 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:23:35.502859 kubelet[1686]: I1213 14:23:35.502817 1686 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:23:35.503758 kubelet[1686]: E1213 14:23:35.503716 1686 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.128.0.77:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:35.513133 kubelet[1686]: E1213 14:23:35.513099 1686 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:23:35.513319 kubelet[1686]: I1213 14:23:35.513278 1686 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:23:35.519087 kubelet[1686]: I1213 14:23:35.519061 1686 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:23:35.521133 kubelet[1686]: I1213 14:23:35.521093 1686 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:23:35.521408 kubelet[1686]: I1213 14:23:35.521358 1686 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:23:35.521637 kubelet[1686]: I1213 14:23:35.521400 1686 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:23:35.521829 kubelet[1686]: I1213 14:23:35.521639 1686 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:23:35.521829 kubelet[1686]: I1213 14:23:35.521658 1686 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:23:35.521829 kubelet[1686]: I1213 14:23:35.521800 1686 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:35.526766 kubelet[1686]: I1213 14:23:35.526727 1686 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:23:35.526766 kubelet[1686]: I1213 14:23:35.526765 1686 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:23:35.526912 kubelet[1686]: I1213 14:23:35.526813 1686 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:23:35.526912 kubelet[1686]: I1213 14:23:35.526835 1686 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:23:35.546859 kubelet[1686]: W1213 14:23:35.546785 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:35.547118 kubelet[1686]: E1213 14:23:35.547086 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:35.547403 kubelet[1686]: I1213 14:23:35.547382 1686 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:23:35.559757 kubelet[1686]: I1213 14:23:35.559694 1686 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:23:35.562028 kubelet[1686]: W1213 14:23:35.561986 1686 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:23:35.563368 kubelet[1686]: I1213 14:23:35.563339 1686 server.go:1269] "Started kubelet" Dec 13 14:23:35.565712 kubelet[1686]: W1213 14:23:35.565646 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:35.565829 kubelet[1686]: E1213 14:23:35.565718 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:35.566869 kubelet[1686]: I1213 14:23:35.565921 1686 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:23:35.567000 audit[1686]: AVC avc: denied { mac_admin } for pid=1686 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.567000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:35.567000 audit[1686]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab38f0 a1=c000abb380 a2=c000ab38c0 a3=25 items=0 ppid=1 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:35.567000 audit[1686]: AVC avc: denied { mac_admin } for pid=1686 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.567000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:35.567000 audit[1686]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac3080 a1=c000abb398 a2=c000ab3980 a3=25 items=0 ppid=1 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:35.570058 kubelet[1686]: I1213 14:23:35.568701 1686 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:23:35.570058 kubelet[1686]: I1213 14:23:35.568757 1686 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:23:35.570058 kubelet[1686]: I1213 14:23:35.568840 1686 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:23:35.572000 audit[1696]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.572000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6832a9e0 a2=0 a3=7ffd6832a9cc items=0 ppid=1686 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:23:35.575130 kubelet[1686]: I1213 14:23:35.575064 1686 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:23:35.573000 audit[1697]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.573000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd28bcc750 a2=0 a3=7ffd28bcc73c items=0 ppid=1686 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:23:35.577823 kubelet[1686]: I1213 14:23:35.577791 1686 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:23:35.578569 kubelet[1686]: I1213 14:23:35.578542 1686 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:23:35.578983 kubelet[1686]: I1213 14:23:35.578955 1686 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:23:35.582483 kubelet[1686]: I1213 14:23:35.582460 1686 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:23:35.583620 kubelet[1686]: E1213 14:23:35.583590 1686 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" not found" Dec 13 14:23:35.583767 kubelet[1686]: E1213 14:23:35.581733 1686 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.77:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.77:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal.1810c29837b84875 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,UID:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:23:35.563282549 +0000 UTC m=+0.797785771,LastTimestamp:2024-12-13 14:23:35.563282549 +0000 UTC m=+0.797785771,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,}" Dec 13 14:23:35.584000 audit[1699]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.584000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd918acf20 a2=0 a3=7ffd918acf0c items=0 ppid=1686 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:35.590056 kubelet[1686]: I1213 14:23:35.590027 1686 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:23:35.590168 kubelet[1686]: I1213 14:23:35.590130 1686 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:23:35.591221 kubelet[1686]: W1213 14:23:35.590651 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:35.591221 kubelet[1686]: E1213 14:23:35.590723 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:35.591221 kubelet[1686]: E1213 14:23:35.590829 1686 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.77:6443: connect: connection refused" interval="200ms" Dec 13 14:23:35.591000 audit[1701]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.591000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcb3899e70 a2=0 a3=7ffcb3899e5c items=0 ppid=1686 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:35.595719 kubelet[1686]: I1213 14:23:35.595691 1686 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:23:35.595719 kubelet[1686]: I1213 14:23:35.595719 1686 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:23:35.595878 kubelet[1686]: I1213 14:23:35.595792 1686 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:23:35.607000 audit[1705]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.607000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe7f6cfa00 a2=0 a3=7ffe7f6cf9ec items=0 ppid=1686 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:23:35.609441 kubelet[1686]: I1213 14:23:35.609263 1686 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:23:35.609000 audit[1706]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:35.609000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff52cdb30 a2=0 a3=7ffff52cdb1c items=0 ppid=1686 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:23:35.610937 kubelet[1686]: I1213 14:23:35.610785 1686 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:23:35.610937 kubelet[1686]: I1213 14:23:35.610822 1686 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:23:35.610937 kubelet[1686]: I1213 14:23:35.610849 1686 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:23:35.610937 kubelet[1686]: E1213 14:23:35.610910 1686 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:23:35.610000 audit[1707]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.610000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc63638020 a2=0 a3=7ffc6363800c items=0 ppid=1686 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:23:35.612000 audit[1708]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.612000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2b314940 a2=0 a3=7fff2b31492c items=0 ppid=1686 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:23:35.614000 audit[1709]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:35.614000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd69d51a30 a2=0 a3=7ffd69d51a1c items=0 ppid=1686 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:23:35.615000 audit[1710]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:35.615000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9728ef60 a2=0 a3=7ffe9728ef4c items=0 ppid=1686 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:23:35.617000 audit[1711]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:35.617000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff8bb84450 a2=0 a3=7fff8bb8443c items=0 ppid=1686 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:23:35.624996 kubelet[1686]: W1213 14:23:35.624794 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:35.624996 kubelet[1686]: E1213 14:23:35.624902 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:35.625000 audit[1714]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:35.625000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca591ef90 a2=0 a3=7ffca591ef7c items=0 ppid=1686 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:23:35.634894 kubelet[1686]: I1213 14:23:35.634858 1686 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:23:35.634894 kubelet[1686]: I1213 14:23:35.634877 1686 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:23:35.635053 kubelet[1686]: I1213 14:23:35.634900 1686 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:35.638490 kubelet[1686]: I1213 14:23:35.638442 1686 policy_none.go:49] "None policy: Start" Dec 13 14:23:35.639642 kubelet[1686]: I1213 14:23:35.639603 1686 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:23:35.639642 kubelet[1686]: I1213 14:23:35.639636 1686 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:23:35.648806 systemd[1]: Created slice kubepods.slice. Dec 13 14:23:35.655935 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:23:35.660695 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:23:35.667309 kubelet[1686]: I1213 14:23:35.667270 1686 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:23:35.666000 audit[1686]: AVC avc: denied { mac_admin } for pid=1686 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:35.666000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:35.666000 audit[1686]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d93050 a1=c000daad20 a2=c000d93020 a3=25 items=0 ppid=1 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:35.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:35.667810 kubelet[1686]: I1213 14:23:35.667451 1686 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:23:35.667810 kubelet[1686]: I1213 14:23:35.667615 1686 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:23:35.667810 kubelet[1686]: I1213 14:23:35.667631 1686 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:23:35.670386 kubelet[1686]: E1213 14:23:35.670360 1686 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" not found" Dec 13 14:23:35.670919 kubelet[1686]: I1213 14:23:35.670903 1686 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:23:35.731765 systemd[1]: Created slice kubepods-burstable-poda74086b98c640e60717e98555be79565.slice. Dec 13 14:23:35.747485 systemd[1]: Created slice kubepods-burstable-pod3d867e3ce8ff48fd8a45c6560dac01d6.slice. Dec 13 14:23:35.756397 systemd[1]: Created slice kubepods-burstable-pod56f0b751a7b0fde82e0d7e499e7aec49.slice. Dec 13 14:23:35.776132 kubelet[1686]: I1213 14:23:35.776090 1686 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.776749 kubelet[1686]: E1213 14:23:35.776706 1686 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.77:6443/api/v1/nodes\": dial tcp 10.128.0.77:6443: connect: connection refused" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.791268 kubelet[1686]: E1213 14:23:35.791221 1686 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.77:6443: connect: connection refused" interval="400ms" Dec 13 14:23:35.892025 kubelet[1686]: I1213 14:23:35.891959 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892025 kubelet[1686]: I1213 14:23:35.892018 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892639 kubelet[1686]: I1213 14:23:35.892049 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892639 kubelet[1686]: I1213 14:23:35.892079 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/56f0b751a7b0fde82e0d7e499e7aec49-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"56f0b751a7b0fde82e0d7e499e7aec49\") " pod="kube-system/kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892639 kubelet[1686]: I1213 14:23:35.892104 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892639 kubelet[1686]: I1213 14:23:35.892133 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892784 kubelet[1686]: I1213 14:23:35.892162 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892784 kubelet[1686]: I1213 14:23:35.892191 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.892784 kubelet[1686]: I1213 14:23:35.892225 1686 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.983177 kubelet[1686]: I1213 14:23:35.983141 1686 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:35.983618 kubelet[1686]: E1213 14:23:35.983576 1686 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.77:6443/api/v1/nodes\": dial tcp 10.128.0.77:6443: connect: connection refused" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:36.045474 env[1220]: time="2024-12-13T14:23:36.045310782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:a74086b98c640e60717e98555be79565,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:36.051908 env[1220]: time="2024-12-13T14:23:36.051583596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:3d867e3ce8ff48fd8a45c6560dac01d6,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:36.060249 env[1220]: time="2024-12-13T14:23:36.060123273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:56f0b751a7b0fde82e0d7e499e7aec49,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:36.192368 kubelet[1686]: E1213 14:23:36.192257 1686 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.77:6443: connect: connection refused" interval="800ms" Dec 13 14:23:36.393209 kubelet[1686]: I1213 14:23:36.393077 1686 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:36.393893 kubelet[1686]: E1213 14:23:36.393836 1686 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.77:6443/api/v1/nodes\": dial tcp 10.128.0.77:6443: connect: connection refused" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:36.448359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3255411132.mount: Deactivated successfully. Dec 13 14:23:36.458746 kubelet[1686]: W1213 14:23:36.458653 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:36.458746 kubelet[1686]: E1213 14:23:36.458744 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.128.0.77:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:36.459915 env[1220]: time="2024-12-13T14:23:36.459859062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.464049 env[1220]: time="2024-12-13T14:23:36.463982624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.466081 env[1220]: time="2024-12-13T14:23:36.466037667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.470444 env[1220]: time="2024-12-13T14:23:36.470392672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.472426 env[1220]: time="2024-12-13T14:23:36.472382425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.476560 env[1220]: time="2024-12-13T14:23:36.476511390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.477663 env[1220]: time="2024-12-13T14:23:36.477582889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.478548 env[1220]: time="2024-12-13T14:23:36.478512254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.482034 env[1220]: time="2024-12-13T14:23:36.481979000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.482915 env[1220]: time="2024-12-13T14:23:36.482871039Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.484324 env[1220]: time="2024-12-13T14:23:36.484261085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.493609 env[1220]: time="2024-12-13T14:23:36.493570462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:36.532697 env[1220]: time="2024-12-13T14:23:36.532610000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:36.532876 env[1220]: time="2024-12-13T14:23:36.532713566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:36.532876 env[1220]: time="2024-12-13T14:23:36.532753901Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:36.533076 env[1220]: time="2024-12-13T14:23:36.532978083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86f0772198783b4bb8a9259c4f716542a10068b5eee77f1ae8b5aa80732a634e pid=1734 runtime=io.containerd.runc.v2 Dec 13 14:23:36.535674 env[1220]: time="2024-12-13T14:23:36.535602578Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:36.535852 env[1220]: time="2024-12-13T14:23:36.535650151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:36.535852 env[1220]: time="2024-12-13T14:23:36.535674982Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:36.536035 env[1220]: time="2024-12-13T14:23:36.535847306Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dcb3fbb5e6d894e047ec82e4d8a449102308bd92472c57497adcd742706c71a pid=1724 runtime=io.containerd.runc.v2 Dec 13 14:23:36.546704 env[1220]: time="2024-12-13T14:23:36.546603724Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:36.546879 env[1220]: time="2024-12-13T14:23:36.546712767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:36.546879 env[1220]: time="2024-12-13T14:23:36.546755674Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:36.547470 env[1220]: time="2024-12-13T14:23:36.547404575Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2773717341c8c1ccba7ab6724895ff82545171b484f7f56250a2bed3fb3d76bf pid=1753 runtime=io.containerd.runc.v2 Dec 13 14:23:36.559544 systemd[1]: Started cri-containerd-2dcb3fbb5e6d894e047ec82e4d8a449102308bd92472c57497adcd742706c71a.scope. Dec 13 14:23:36.579112 systemd[1]: Started cri-containerd-86f0772198783b4bb8a9259c4f716542a10068b5eee77f1ae8b5aa80732a634e.scope. Dec 13 14:23:36.581048 kubelet[1686]: W1213 14:23:36.580632 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:36.581048 kubelet[1686]: E1213 14:23:36.580765 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.128.0.77:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal&limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:36.602644 systemd[1]: Started cri-containerd-2773717341c8c1ccba7ab6724895ff82545171b484f7f56250a2bed3fb3d76bf.scope. Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.622000 audit: BPF prog-id=58 op=LOAD Dec 13 14:23:36.628230 kubelet[1686]: W1213 14:23:36.626701 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:36.628230 kubelet[1686]: E1213 14:23:36.626800 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.128.0.77:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:36.628000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.628000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663037373231393837383362346262386139323539633466373136 Dec 13 14:23:36.628000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.628000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663037373231393837383362346262386139323539633466373136 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.630000 audit: BPF prog-id=59 op=LOAD Dec 13 14:23:36.631000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636233666262356536643839346530343765633832653464386134 Dec 13 14:23:36.631000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636233666262356536643839346530343765633832653464386134 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit: BPF prog-id=60 op=LOAD Dec 13 14:23:36.631000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003585f0 items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663037373231393837383362346262386139323539633466373136 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit: BPF prog-id=61 op=LOAD Dec 13 14:23:36.631000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000358638 items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663037373231393837383362346262386139323539633466373136 Dec 13 14:23:36.631000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:23:36.631000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.631000 audit: BPF prog-id=62 op=LOAD Dec 13 14:23:36.631000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000358a48 items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836663037373231393837383362346262386139323539633466373136 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit: BPF prog-id=63 op=LOAD Dec 13 14:23:36.632000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032ccb0 items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636233666262356536643839346530343765633832653464386134 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit: BPF prog-id=64 op=LOAD Dec 13 14:23:36.632000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032ccf8 items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636233666262356536643839346530343765633832653464386134 Dec 13 14:23:36.632000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:23:36.632000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { perfmon } for pid=1760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit[1760]: AVC avc: denied { bpf } for pid=1760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.632000 audit: BPF prog-id=65 op=LOAD Dec 13 14:23:36.632000 audit[1760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032d108 items=0 ppid=1724 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636233666262356536643839346530343765633832653464386134 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit: BPF prog-id=66 op=LOAD Dec 13 14:23:36.653000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.653000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373337313733343163386331636362613761623637323438393566 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373337313733343163386331636362613761623637323438393566 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.656000 audit: BPF prog-id=67 op=LOAD Dec 13 14:23:36.656000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cd0 items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373337313733343163386331636362613761623637323438393566 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.657000 audit: BPF prog-id=68 op=LOAD Dec 13 14:23:36.657000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d18 items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373337313733343163386331636362613761623637323438393566 Dec 13 14:23:36.660000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:23:36.660000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { perfmon } for pid=1781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit[1781]: AVC avc: denied { bpf } for pid=1781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.660000 audit: BPF prog-id=69 op=LOAD Dec 13 14:23:36.660000 audit[1781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2128 items=0 ppid=1753 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:36.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237373337313733343163386331636362613761623637323438393566 Dec 13 14:23:36.710950 env[1220]: time="2024-12-13T14:23:36.710857229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:3d867e3ce8ff48fd8a45c6560dac01d6,Namespace:kube-system,Attempt:0,} returns sandbox id \"86f0772198783b4bb8a9259c4f716542a10068b5eee77f1ae8b5aa80732a634e\"" Dec 13 14:23:36.717271 kubelet[1686]: E1213 14:23:36.716644 1686 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flat" Dec 13 14:23:36.719948 env[1220]: time="2024-12-13T14:23:36.719890179Z" level=info msg="CreateContainer within sandbox \"86f0772198783b4bb8a9259c4f716542a10068b5eee77f1ae8b5aa80732a634e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:23:36.740687 env[1220]: time="2024-12-13T14:23:36.740621374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:a74086b98c640e60717e98555be79565,Namespace:kube-system,Attempt:0,} returns sandbox id \"2773717341c8c1ccba7ab6724895ff82545171b484f7f56250a2bed3fb3d76bf\"" Dec 13 14:23:36.744721 kubelet[1686]: E1213 14:23:36.744679 1686 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-21291" Dec 13 14:23:36.746283 env[1220]: time="2024-12-13T14:23:36.746233753Z" level=info msg="CreateContainer within sandbox \"2773717341c8c1ccba7ab6724895ff82545171b484f7f56250a2bed3fb3d76bf\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:23:36.781433 env[1220]: time="2024-12-13T14:23:36.781363287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal,Uid:56f0b751a7b0fde82e0d7e499e7aec49,Namespace:kube-system,Attempt:0,} returns sandbox id \"2dcb3fbb5e6d894e047ec82e4d8a449102308bd92472c57497adcd742706c71a\"" Dec 13 14:23:36.782960 kubelet[1686]: E1213 14:23:36.782918 1686 kubelet_pods.go:538] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-21291" Dec 13 14:23:36.784424 env[1220]: time="2024-12-13T14:23:36.784384626Z" level=info msg="CreateContainer within sandbox \"2dcb3fbb5e6d894e047ec82e4d8a449102308bd92472c57497adcd742706c71a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:23:36.910587 kubelet[1686]: W1213 14:23:36.907179 1686 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.77:6443: connect: connection refused Dec 13 14:23:36.910587 kubelet[1686]: E1213 14:23:36.907286 1686 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.128.0.77:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.128.0.77:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:23:36.911229 env[1220]: time="2024-12-13T14:23:36.907440596Z" level=info msg="CreateContainer within sandbox \"86f0772198783b4bb8a9259c4f716542a10068b5eee77f1ae8b5aa80732a634e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"db36a6be39f106e5076558c3659ba5eeafb6c183fa84a2ecae4717336137b7a1\"" Dec 13 14:23:36.911229 env[1220]: time="2024-12-13T14:23:36.908241750Z" level=info msg="StartContainer for \"db36a6be39f106e5076558c3659ba5eeafb6c183fa84a2ecae4717336137b7a1\"" Dec 13 14:23:36.915670 env[1220]: time="2024-12-13T14:23:36.915606705Z" level=info msg="CreateContainer within sandbox \"2773717341c8c1ccba7ab6724895ff82545171b484f7f56250a2bed3fb3d76bf\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7b8854685a0bfcdf018c2ed2856b649eee9f393e6b9bda0cc02d2220a79b15a6\"" Dec 13 14:23:36.916367 env[1220]: time="2024-12-13T14:23:36.916326455Z" level=info msg="StartContainer for \"7b8854685a0bfcdf018c2ed2856b649eee9f393e6b9bda0cc02d2220a79b15a6\"" Dec 13 14:23:36.918286 env[1220]: time="2024-12-13T14:23:36.917818840Z" level=info msg="CreateContainer within sandbox \"2dcb3fbb5e6d894e047ec82e4d8a449102308bd92472c57497adcd742706c71a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"215e27a9e9b31ffa8a0d63546efd47e8e073ef51f9bc77f5f0be97831361e9e0\"" Dec 13 14:23:36.919321 env[1220]: time="2024-12-13T14:23:36.919264115Z" level=info msg="StartContainer for \"215e27a9e9b31ffa8a0d63546efd47e8e073ef51f9bc77f5f0be97831361e9e0\"" Dec 13 14:23:36.956232 systemd[1]: Started cri-containerd-db36a6be39f106e5076558c3659ba5eeafb6c183fa84a2ecae4717336137b7a1.scope. Dec 13 14:23:36.976611 systemd[1]: Started cri-containerd-215e27a9e9b31ffa8a0d63546efd47e8e073ef51f9bc77f5f0be97831361e9e0.scope. Dec 13 14:23:36.993127 kubelet[1686]: E1213 14:23:36.993035 1686 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.77:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.77:6443: connect: connection refused" interval="1.6s" Dec 13 14:23:36.995361 systemd[1]: Started cri-containerd-7b8854685a0bfcdf018c2ed2856b649eee9f393e6b9bda0cc02d2220a79b15a6.scope. Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:36.999000 audit: BPF prog-id=70 op=LOAD Dec 13 14:23:37.000000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.000000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1734 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333661366265333966313036653530373635353863333635396261 Dec 13 14:23:37.000000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.000000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1734 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333661366265333966313036653530373635353863333635396261 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.002000 audit: BPF prog-id=71 op=LOAD Dec 13 14:23:37.002000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b52d0 items=0 ppid=1734 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333661366265333966313036653530373635353863333635396261 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.003000 audit: BPF prog-id=72 op=LOAD Dec 13 14:23:37.003000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b5318 items=0 ppid=1734 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333661366265333966313036653530373635353863333635396261 Dec 13 14:23:37.004000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:23:37.005000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { perfmon } for pid=1863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit[1863]: AVC avc: denied { bpf } for pid=1863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.005000 audit: BPF prog-id=73 op=LOAD Dec 13 14:23:37.005000 audit[1863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b5728 items=0 ppid=1734 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462333661366265333966313036653530373635353863333635396261 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.026000 audit: BPF prog-id=74 op=LOAD Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1753 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383835343638356130626663646630313863326564323835366236 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1753 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383835343638356130626663646630313863326564323835366236 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.027000 audit: BPF prog-id=75 op=LOAD Dec 13 14:23:37.027000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c9430 items=0 ppid=1753 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383835343638356130626663646630313863326564323835366236 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit: BPF prog-id=76 op=LOAD Dec 13 14:23:37.028000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c9478 items=0 ppid=1753 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383835343638356130626663646630313863326564323835366236 Dec 13 14:23:37.028000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:23:37.028000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { perfmon } for pid=1869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit[1869]: AVC avc: denied { bpf } for pid=1869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.028000 audit: BPF prog-id=77 op=LOAD Dec 13 14:23:37.028000 audit[1869]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9888 items=0 ppid=1753 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383835343638356130626663646630313863326564323835366236 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.037000 audit: BPF prog-id=78 op=LOAD Dec 13 14:23:37.038000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.038000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1724 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356532376139653962333166666138613064363335343665666434 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1724 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356532376139653962333166666138613064363335343665666434 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.039000 audit: BPF prog-id=79 op=LOAD Dec 13 14:23:37.039000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000311fa0 items=0 ppid=1724 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356532376139653962333166666138613064363335343665666434 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.040000 audit: BPF prog-id=80 op=LOAD Dec 13 14:23:37.040000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000311fe8 items=0 ppid=1724 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356532376139653962333166666138613064363335343665666434 Dec 13 14:23:37.041000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:23:37.041000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:37.041000 audit: BPF prog-id=81 op=LOAD Dec 13 14:23:37.041000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0004183f8 items=0 ppid=1724 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:37.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231356532376139653962333166666138613064363335343665666434 Dec 13 14:23:37.078452 env[1220]: time="2024-12-13T14:23:37.078388973Z" level=info msg="StartContainer for \"db36a6be39f106e5076558c3659ba5eeafb6c183fa84a2ecae4717336137b7a1\" returns successfully" Dec 13 14:23:37.114740 env[1220]: time="2024-12-13T14:23:37.114678964Z" level=info msg="StartContainer for \"7b8854685a0bfcdf018c2ed2856b649eee9f393e6b9bda0cc02d2220a79b15a6\" returns successfully" Dec 13 14:23:37.145262 env[1220]: time="2024-12-13T14:23:37.145202960Z" level=info msg="StartContainer for \"215e27a9e9b31ffa8a0d63546efd47e8e073ef51f9bc77f5f0be97831361e9e0\" returns successfully" Dec 13 14:23:37.200928 kubelet[1686]: I1213 14:23:37.200341 1686 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:37.200928 kubelet[1686]: E1213 14:23:37.200774 1686 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.128.0.77:6443/api/v1/nodes\": dial tcp 10.128.0.77:6443: connect: connection refused" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:38.806370 kubelet[1686]: I1213 14:23:38.806333 1686 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:39.852000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:39.859089 kernel: kauditd_printk_skb: 561 callbacks suppressed Dec 13 14:23:39.859226 kernel: audit: type=1400 audit(1734099819.852:538): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:39.852000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c941b0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:39.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:39.960426 kernel: audit: type=1300 audit(1734099819.852:538): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c941b0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:39.960605 kernel: audit: type=1327 audit(1734099819.852:538): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:39.960650 kernel: audit: type=1400 audit(1734099819.852:539): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:39.852000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:39.852000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003e6160 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:40.021467 kernel: audit: type=1300 audit(1734099819.852:539): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003e6160 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:39.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:40.050377 kernel: audit: type=1327 audit(1734099819.852:539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:40.195000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.224329 kernel: audit: type=1400 audit(1734099820.195:540): avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.195000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00395c150 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.264322 kernel: audit: type=1300 audit(1734099820.195:540): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00395c150 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.223000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.351342 kernel: audit: type=1327 audit(1734099820.195:540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.351476 kernel: audit: type=1400 audit(1734099820.223:541): avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.223000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0048242c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.280000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=527908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.280000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00395c810 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.361000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.361000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c004339d80 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.361000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.361000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c006e04840 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.365000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=527902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:40.365000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c006e04a20 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:23:40.365000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:23:40.489128 kubelet[1686]: E1213 14:23:40.488966 1686 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:40.568049 kubelet[1686]: I1213 14:23:40.568004 1686 apiserver.go:52] "Watching apiserver" Dec 13 14:23:40.590281 kubelet[1686]: I1213 14:23:40.590244 1686 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:23:40.600347 kubelet[1686]: I1213 14:23:40.600255 1686 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:41.353090 kubelet[1686]: W1213 14:23:41.353051 1686 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:42.809376 systemd[1]: Reloading. Dec 13 14:23:43.002151 /usr/lib/systemd/system-generators/torcx-generator[1991]: time="2024-12-13T14:23:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:43.002232 /usr/lib/systemd/system-generators/torcx-generator[1991]: time="2024-12-13T14:23:43Z" level=info msg="torcx already run" Dec 13 14:23:43.137148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:43.137177 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:43.172487 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.343000 audit: BPF prog-id=82 op=LOAD Dec 13 14:23:43.343000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.345000 audit: BPF prog-id=83 op=LOAD Dec 13 14:23:43.345000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:23:43.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.348000 audit: BPF prog-id=84 op=LOAD Dec 13 14:23:43.348000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.351000 audit: BPF prog-id=85 op=LOAD Dec 13 14:23:43.351000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.352000 audit: BPF prog-id=86 op=LOAD Dec 13 14:23:43.352000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.355000 audit: BPF prog-id=87 op=LOAD Dec 13 14:23:43.355000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit: BPF prog-id=88 op=LOAD Dec 13 14:23:43.359000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit: BPF prog-id=89 op=LOAD Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.359000 audit: BPF prog-id=90 op=LOAD Dec 13 14:23:43.359000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:23:43.359000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit: BPF prog-id=91 op=LOAD Dec 13 14:23:43.360000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit: BPF prog-id=92 op=LOAD Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.360000 audit: BPF prog-id=93 op=LOAD Dec 13 14:23:43.360000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:23:43.360000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.361000 audit: BPF prog-id=94 op=LOAD Dec 13 14:23:43.361000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.363000 audit: BPF prog-id=95 op=LOAD Dec 13 14:23:43.363000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.366000 audit: BPF prog-id=96 op=LOAD Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.367000 audit: BPF prog-id=97 op=LOAD Dec 13 14:23:43.367000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:23:43.367000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit: BPF prog-id=98 op=LOAD Dec 13 14:23:43.369000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.370000 audit: BPF prog-id=99 op=LOAD Dec 13 14:23:43.370000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit: BPF prog-id=100 op=LOAD Dec 13 14:23:43.371000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit: BPF prog-id=101 op=LOAD Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.371000 audit: BPF prog-id=102 op=LOAD Dec 13 14:23:43.371000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:23:43.371000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:23:43.394811 systemd[1]: Stopping kubelet.service... Dec 13 14:23:43.418712 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:23:43.418994 systemd[1]: Stopped kubelet.service. Dec 13 14:23:43.419085 systemd[1]: kubelet.service: Consumed 1.256s CPU time. Dec 13 14:23:43.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:43.425102 systemd[1]: Starting kubelet.service... Dec 13 14:23:43.633677 systemd[1]: Started kubelet.service. Dec 13 14:23:43.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:43.722095 kubelet[2027]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:43.723377 kubelet[2027]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:23:43.723518 kubelet[2027]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:23:43.723753 kubelet[2027]: I1213 14:23:43.723713 2027 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:23:43.741457 kubelet[2027]: I1213 14:23:43.735565 2027 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:23:43.741457 kubelet[2027]: I1213 14:23:43.735596 2027 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:23:43.741457 kubelet[2027]: I1213 14:23:43.735947 2027 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:23:43.741457 kubelet[2027]: I1213 14:23:43.738186 2027 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:23:43.741457 kubelet[2027]: I1213 14:23:43.741269 2027 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:23:43.755273 kubelet[2027]: E1213 14:23:43.754082 2027 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:23:43.755633 kubelet[2027]: I1213 14:23:43.755610 2027 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:23:43.763649 kubelet[2027]: I1213 14:23:43.763602 2027 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:23:43.763780 kubelet[2027]: I1213 14:23:43.763767 2027 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:23:43.764021 kubelet[2027]: I1213 14:23:43.763972 2027 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:23:43.764416 kubelet[2027]: I1213 14:23:43.764005 2027 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:23:43.764602 kubelet[2027]: I1213 14:23:43.764417 2027 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:23:43.764602 kubelet[2027]: I1213 14:23:43.764445 2027 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:23:43.764602 kubelet[2027]: I1213 14:23:43.764514 2027 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:43.764771 kubelet[2027]: I1213 14:23:43.764661 2027 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:23:43.764771 kubelet[2027]: I1213 14:23:43.764685 2027 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:23:43.764870 kubelet[2027]: I1213 14:23:43.764792 2027 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:23:43.764870 kubelet[2027]: I1213 14:23:43.764817 2027 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:23:43.787051 kubelet[2027]: I1213 14:23:43.787016 2027 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:23:43.789876 kubelet[2027]: I1213 14:23:43.789848 2027 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:23:43.794023 kubelet[2027]: I1213 14:23:43.793999 2027 server.go:1269] "Started kubelet" Dec 13 14:23:43.798498 kubelet[2027]: I1213 14:23:43.798454 2027 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:23:43.798710 kubelet[2027]: I1213 14:23:43.798684 2027 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:23:43.798862 kubelet[2027]: I1213 14:23:43.798847 2027 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:23:43.797000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.797000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:43.797000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005622a0 a1=c00004b2d8 a2=c000128f90 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:43.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:43.797000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.797000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:43.797000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005ce2e0 a1=c00004b2f0 a2=c000562f30 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:43.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:43.804024 kubelet[2027]: E1213 14:23:43.803997 2027 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:23:43.804366 kubelet[2027]: I1213 14:23:43.804350 2027 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:23:43.807522 kubelet[2027]: I1213 14:23:43.805817 2027 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:23:43.810870 kubelet[2027]: I1213 14:23:43.810844 2027 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:23:43.812190 kubelet[2027]: I1213 14:23:43.812167 2027 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:23:43.813951 kubelet[2027]: I1213 14:23:43.813929 2027 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:23:43.815180 kubelet[2027]: I1213 14:23:43.815154 2027 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:23:43.816705 kubelet[2027]: I1213 14:23:43.815867 2027 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:23:43.817269 kubelet[2027]: I1213 14:23:43.817241 2027 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:23:43.825343 kubelet[2027]: I1213 14:23:43.825317 2027 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:23:43.825481 kubelet[2027]: I1213 14:23:43.825455 2027 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:23:43.828831 kubelet[2027]: I1213 14:23:43.828809 2027 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:23:43.842998 kubelet[2027]: I1213 14:23:43.842961 2027 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:23:43.845011 kubelet[2027]: I1213 14:23:43.844977 2027 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:23:43.845163 kubelet[2027]: I1213 14:23:43.845149 2027 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:23:43.845273 kubelet[2027]: I1213 14:23:43.845258 2027 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:23:43.845478 kubelet[2027]: E1213 14:23:43.845439 2027 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:23:43.940770 kubelet[2027]: I1213 14:23:43.940721 2027 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:23:43.940991 kubelet[2027]: I1213 14:23:43.940974 2027 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:23:43.941124 kubelet[2027]: I1213 14:23:43.941111 2027 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:23:43.941696 kubelet[2027]: I1213 14:23:43.941672 2027 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:23:43.941955 kubelet[2027]: I1213 14:23:43.941917 2027 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:23:43.942115 kubelet[2027]: I1213 14:23:43.942100 2027 policy_none.go:49] "None policy: Start" Dec 13 14:23:43.943478 kubelet[2027]: I1213 14:23:43.943452 2027 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:23:43.943629 kubelet[2027]: I1213 14:23:43.943496 2027 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:23:43.943813 kubelet[2027]: I1213 14:23:43.943776 2027 state_mem.go:75] "Updated machine memory state" Dec 13 14:23:43.946112 kubelet[2027]: E1213 14:23:43.946065 2027 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:23:43.956860 kubelet[2027]: I1213 14:23:43.956814 2027 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:23:43.958000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:43.958000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:23:43.958000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b60fc0 a1=c000bc1308 a2=c000b60f90 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:43.958000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:23:43.959976 kubelet[2027]: I1213 14:23:43.959937 2027 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:23:43.961714 kubelet[2027]: I1213 14:23:43.961690 2027 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:23:43.961885 kubelet[2027]: I1213 14:23:43.961836 2027 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:23:43.964720 kubelet[2027]: I1213 14:23:43.964700 2027 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:23:44.081306 kubelet[2027]: I1213 14:23:44.081158 2027 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.097208 kubelet[2027]: I1213 14:23:44.096905 2027 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.097208 kubelet[2027]: I1213 14:23:44.097018 2027 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.157720 kubelet[2027]: W1213 14:23:44.157679 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:44.157925 kubelet[2027]: E1213 14:23:44.157795 2027 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.158022 kubelet[2027]: W1213 14:23:44.157940 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:44.159000 kubelet[2027]: W1213 14:23:44.158220 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:44.219111 kubelet[2027]: I1213 14:23:44.217932 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219111 kubelet[2027]: I1213 14:23:44.218059 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219111 kubelet[2027]: I1213 14:23:44.218126 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/56f0b751a7b0fde82e0d7e499e7aec49-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"56f0b751a7b0fde82e0d7e499e7aec49\") " pod="kube-system/kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219111 kubelet[2027]: I1213 14:23:44.218159 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219442 kubelet[2027]: I1213 14:23:44.218264 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219442 kubelet[2027]: I1213 14:23:44.218324 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219442 kubelet[2027]: I1213 14:23:44.218356 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a74086b98c640e60717e98555be79565-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"a74086b98c640e60717e98555be79565\") " pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219442 kubelet[2027]: I1213 14:23:44.218411 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.219579 kubelet[2027]: I1213 14:23:44.218472 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3d867e3ce8ff48fd8a45c6560dac01d6-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" (UID: \"3d867e3ce8ff48fd8a45c6560dac01d6\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.769391 kubelet[2027]: I1213 14:23:44.769347 2027 apiserver.go:52] "Watching apiserver" Dec 13 14:23:44.815699 kubelet[2027]: I1213 14:23:44.815644 2027 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:23:44.941083 kubelet[2027]: W1213 14:23:44.941038 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:44.941328 kubelet[2027]: E1213 14:23:44.941145 2027 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:44.941535 kubelet[2027]: W1213 14:23:44.941508 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:23:44.941634 kubelet[2027]: E1213 14:23:44.941600 2027 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:23:45.024421 kubelet[2027]: I1213 14:23:45.024217 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" podStartSLOduration=1.024191951 podStartE2EDuration="1.024191951s" podCreationTimestamp="2024-12-13 14:23:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:44.984095096 +0000 UTC m=+1.343565403" watchObservedRunningTime="2024-12-13 14:23:45.024191951 +0000 UTC m=+1.383662254" Dec 13 14:23:45.049540 kubelet[2027]: I1213 14:23:45.049426 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" podStartSLOduration=4.049369112 podStartE2EDuration="4.049369112s" podCreationTimestamp="2024-12-13 14:23:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:45.025493353 +0000 UTC m=+1.384963657" watchObservedRunningTime="2024-12-13 14:23:45.049369112 +0000 UTC m=+1.408839417" Dec 13 14:23:45.065764 kubelet[2027]: I1213 14:23:45.065631 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" podStartSLOduration=1.065604879 podStartE2EDuration="1.065604879s" podCreationTimestamp="2024-12-13 14:23:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:45.050517419 +0000 UTC m=+1.409987753" watchObservedRunningTime="2024-12-13 14:23:45.065604879 +0000 UTC m=+1.425075178" Dec 13 14:23:45.599529 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 14:23:45.599784 kernel: audit: type=1400 audit(1734099825.567:795): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.567000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.567000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013d6800 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.659326 kernel: audit: type=1300 audit(1734099825.567:795): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013d6800 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.606000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.738452 kernel: audit: type=1327 audit(1734099825.567:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.738632 kernel: audit: type=1400 audit(1734099825.606:796): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.738684 kernel: audit: type=1300 audit(1734099825.606:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001443be0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.606000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001443be0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.606000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.801752 kernel: audit: type=1327 audit(1734099825.606:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.801935 kernel: audit: type=1400 audit(1734099825.610:797): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.610000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.610000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001443dc0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.862067 kernel: audit: type=1300 audit(1734099825.610:797): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001443dc0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.610000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.918002 kernel: audit: type=1327 audit(1734099825.610:797): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.918173 kernel: audit: type=1400 audit(1734099825.610:798): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:23:45.610000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001443de0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:45.920000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=527933 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:23:45.920000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba9200 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:23:45.920000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:23:46.826435 update_engine[1212]: I1213 14:23:46.826378 1212 update_attempter.cc:509] Updating boot flags... Dec 13 14:23:47.856213 kubelet[2027]: I1213 14:23:47.855756 2027 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:23:47.856863 env[1220]: time="2024-12-13T14:23:47.856640554Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:23:47.857357 kubelet[2027]: I1213 14:23:47.857000 2027 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:23:48.747233 systemd[1]: Created slice kubepods-besteffort-pod7034a459_9ac9_4dd7_8aad_15f7ee3be062.slice. Dec 13 14:23:48.754037 kubelet[2027]: I1213 14:23:48.753996 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7034a459-9ac9-4dd7-8aad-15f7ee3be062-lib-modules\") pod \"kube-proxy-w5lk8\" (UID: \"7034a459-9ac9-4dd7-8aad-15f7ee3be062\") " pod="kube-system/kube-proxy-w5lk8" Dec 13 14:23:48.754228 kubelet[2027]: I1213 14:23:48.754048 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6kxdb\" (UniqueName: \"kubernetes.io/projected/7034a459-9ac9-4dd7-8aad-15f7ee3be062-kube-api-access-6kxdb\") pod \"kube-proxy-w5lk8\" (UID: \"7034a459-9ac9-4dd7-8aad-15f7ee3be062\") " pod="kube-system/kube-proxy-w5lk8" Dec 13 14:23:48.754228 kubelet[2027]: I1213 14:23:48.754085 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7034a459-9ac9-4dd7-8aad-15f7ee3be062-kube-proxy\") pod \"kube-proxy-w5lk8\" (UID: \"7034a459-9ac9-4dd7-8aad-15f7ee3be062\") " pod="kube-system/kube-proxy-w5lk8" Dec 13 14:23:48.754228 kubelet[2027]: I1213 14:23:48.754109 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7034a459-9ac9-4dd7-8aad-15f7ee3be062-xtables-lock\") pod \"kube-proxy-w5lk8\" (UID: \"7034a459-9ac9-4dd7-8aad-15f7ee3be062\") " pod="kube-system/kube-proxy-w5lk8" Dec 13 14:23:48.867166 kubelet[2027]: I1213 14:23:48.867106 2027 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:23:48.928995 systemd[1]: Created slice kubepods-besteffort-pod0bc0ce2b_9ae6_45f9_adb8_e0cf0a6c5d1b.slice. Dec 13 14:23:48.956649 kubelet[2027]: I1213 14:23:48.956598 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b-var-lib-calico\") pod \"tigera-operator-76c4976dd7-zzp6m\" (UID: \"0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b\") " pod="tigera-operator/tigera-operator-76c4976dd7-zzp6m" Dec 13 14:23:48.956867 kubelet[2027]: I1213 14:23:48.956665 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7rfqn\" (UniqueName: \"kubernetes.io/projected/0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b-kube-api-access-7rfqn\") pod \"tigera-operator-76c4976dd7-zzp6m\" (UID: \"0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b\") " pod="tigera-operator/tigera-operator-76c4976dd7-zzp6m" Dec 13 14:23:49.063400 env[1220]: time="2024-12-13T14:23:49.063217002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w5lk8,Uid:7034a459-9ac9-4dd7-8aad-15f7ee3be062,Namespace:kube-system,Attempt:0,}" Dec 13 14:23:49.093804 env[1220]: time="2024-12-13T14:23:49.093359187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:49.093804 env[1220]: time="2024-12-13T14:23:49.093461051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:49.093804 env[1220]: time="2024-12-13T14:23:49.093510799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:49.093804 env[1220]: time="2024-12-13T14:23:49.093719069Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/449e75a4a92f656244ae4bd2cb2d71105ad672fe5cf765b0b72023ffc469dfeb pid=2114 runtime=io.containerd.runc.v2 Dec 13 14:23:49.118608 systemd[1]: Started cri-containerd-449e75a4a92f656244ae4bd2cb2d71105ad672fe5cf765b0b72023ffc469dfeb.scope. Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.141000 audit: BPF prog-id=103 op=LOAD Dec 13 14:23:49.142000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.142000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2114 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537356134613932663635363234346165346264326362326437 Dec 13 14:23:49.142000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.142000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2114 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537356134613932663635363234346165346264326362326437 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit: BPF prog-id=104 op=LOAD Dec 13 14:23:49.143000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037a350 items=0 ppid=2114 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537356134613932663635363234346165346264326362326437 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit: BPF prog-id=105 op=LOAD Dec 13 14:23:49.143000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037a398 items=0 ppid=2114 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537356134613932663635363234346165346264326362326437 Dec 13 14:23:49.143000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:23:49.143000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.143000 audit: BPF prog-id=106 op=LOAD Dec 13 14:23:49.143000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037a7a8 items=0 ppid=2114 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537356134613932663635363234346165346264326362326437 Dec 13 14:23:49.161599 env[1220]: time="2024-12-13T14:23:49.161053446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w5lk8,Uid:7034a459-9ac9-4dd7-8aad-15f7ee3be062,Namespace:kube-system,Attempt:0,} returns sandbox id \"449e75a4a92f656244ae4bd2cb2d71105ad672fe5cf765b0b72023ffc469dfeb\"" Dec 13 14:23:49.166163 env[1220]: time="2024-12-13T14:23:49.164955602Z" level=info msg="CreateContainer within sandbox \"449e75a4a92f656244ae4bd2cb2d71105ad672fe5cf765b0b72023ffc469dfeb\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:23:49.185475 env[1220]: time="2024-12-13T14:23:49.185407038Z" level=info msg="CreateContainer within sandbox \"449e75a4a92f656244ae4bd2cb2d71105ad672fe5cf765b0b72023ffc469dfeb\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e0984ef01741717530ee25a39d5d71d80a36c96bfbae71c638ad2dbb79fa88d8\"" Dec 13 14:23:49.186573 env[1220]: time="2024-12-13T14:23:49.186533997Z" level=info msg="StartContainer for \"e0984ef01741717530ee25a39d5d71d80a36c96bfbae71c638ad2dbb79fa88d8\"" Dec 13 14:23:49.212060 systemd[1]: Started cri-containerd-e0984ef01741717530ee25a39d5d71d80a36c96bfbae71c638ad2dbb79fa88d8.scope. Dec 13 14:23:49.234799 env[1220]: time="2024-12-13T14:23:49.234746751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zzp6m,Uid:0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:23:49.245000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.245000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f71258bc0a8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393834656630313734313731373533306565323561333964356437 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit: BPF prog-id=107 op=LOAD Dec 13 14:23:49.246000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8dd8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393834656630313734313731373533306565323561333964356437 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.246000 audit: BPF prog-id=108 op=LOAD Dec 13 14:23:49.246000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8e28 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393834656630313734313731373533306565323561333964356437 Dec 13 14:23:49.248000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:23:49.248000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.248000 audit: BPF prog-id=109 op=LOAD Dec 13 14:23:49.248000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8eb8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393834656630313734313731373533306565323561333964356437 Dec 13 14:23:49.284873 env[1220]: time="2024-12-13T14:23:49.284785256Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:49.285181 env[1220]: time="2024-12-13T14:23:49.285135570Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:49.285422 env[1220]: time="2024-12-13T14:23:49.285382388Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:49.285792 env[1220]: time="2024-12-13T14:23:49.285749814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7380397143e1fca37c096b66130b2d9b767dce85599551a5e9ba0c17601386c8 pid=2180 runtime=io.containerd.runc.v2 Dec 13 14:23:49.290733 env[1220]: time="2024-12-13T14:23:49.290647955Z" level=info msg="StartContainer for \"e0984ef01741717530ee25a39d5d71d80a36c96bfbae71c638ad2dbb79fa88d8\" returns successfully" Dec 13 14:23:49.311991 systemd[1]: Started cri-containerd-7380397143e1fca37c096b66130b2d9b767dce85599551a5e9ba0c17601386c8.scope. Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.351000 audit: BPF prog-id=110 op=LOAD Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733383033393731343365316663613337633039366236363133306232 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733383033393731343365316663613337633039366236363133306232 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit: BPF prog-id=111 op=LOAD Dec 13 14:23:49.354000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00035dfe0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733383033393731343365316663613337633039366236363133306232 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.354000 audit: BPF prog-id=112 op=LOAD Dec 13 14:23:49.354000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e0028 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733383033393731343365316663613337633039366236363133306232 Dec 13 14:23:49.354000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:23:49.354000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:49.355000 audit: BPF prog-id=113 op=LOAD Dec 13 14:23:49.355000 audit[2198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e0438 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733383033393731343365316663613337633039366236363133306232 Dec 13 14:23:49.427287 env[1220]: time="2024-12-13T14:23:49.427220975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zzp6m,Uid:0bc0ce2b-9ae6-45f9-adb8-e0cf0a6c5d1b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7380397143e1fca37c096b66130b2d9b767dce85599551a5e9ba0c17601386c8\"" Dec 13 14:23:49.432446 env[1220]: time="2024-12-13T14:23:49.430531546Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:23:49.501000 audit[2255]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.501000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe58fe9ba0 a2=0 a3=7ffe58fe9b8c items=0 ppid=2166 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:49.505000 audit[2256]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.505000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc07231a10 a2=0 a3=7ffc072319fc items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:49.508000 audit[2257]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.508000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfc3607f0 a2=0 a3=7ffdfc3607dc items=0 ppid=2166 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:49.512000 audit[2258]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.512000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfe2cbc50 a2=0 a3=7ffdfe2cbc3c items=0 ppid=2166 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:23:49.513000 audit[2259]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.513000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75f8c750 a2=0 a3=7ffd75f8c73c items=0 ppid=2166 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:23:49.516000 audit[2260]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.516000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7701f2b0 a2=0 a3=7fff7701f29c items=0 ppid=2166 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:23:49.604000 audit[2261]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.604000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffcdcce060 a2=0 a3=7fffcdcce04c items=0 ppid=2166 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:49.610000 audit[2263]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.610000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffe3af2780 a2=0 a3=7fffe3af276c items=0 ppid=2166 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:23:49.616000 audit[2266]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.616000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdf12cefc0 a2=0 a3=7ffdf12cefac items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:23:49.617000 audit[2267]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.617000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff03d355d0 a2=0 a3=7fff03d355bc items=0 ppid=2166 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:49.621000 audit[2269]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.621000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc73040f00 a2=0 a3=7ffc73040eec items=0 ppid=2166 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:49.623000 audit[2270]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.623000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd402036d0 a2=0 a3=7ffd402036bc items=0 ppid=2166 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:49.627000 audit[2272]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.627000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc18ca47b0 a2=0 a3=7ffc18ca479c items=0 ppid=2166 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:49.633000 audit[2275]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.633000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd02c50ab0 a2=0 a3=7ffd02c50a9c items=0 ppid=2166 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:23:49.635000 audit[2276]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.635000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd4e964a0 a2=0 a3=7ffcd4e9648c items=0 ppid=2166 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:49.638000 audit[2278]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.638000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5d3941a0 a2=0 a3=7ffe5d39418c items=0 ppid=2166 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:49.641000 audit[2279]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.641000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaa659880 a2=0 a3=7ffeaa65986c items=0 ppid=2166 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:49.646000 audit[2281]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.646000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc0743780 a2=0 a3=7ffcc074376c items=0 ppid=2166 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:49.654000 audit[2284]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.654000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdf415cd0 a2=0 a3=7fffdf415cbc items=0 ppid=2166 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:49.660000 audit[2287]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.660000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedb055b00 a2=0 a3=7ffedb055aec items=0 ppid=2166 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:49.662000 audit[2288]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.662000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2a4d54e0 a2=0 a3=7ffc2a4d54cc items=0 ppid=2166 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:49.667000 audit[2290]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.667000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffb03e4f10 a2=0 a3=7fffb03e4efc items=0 ppid=2166 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.667000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:49.673000 audit[2294]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.673000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc985e8680 a2=0 a3=7ffc985e866c items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:49.675000 audit[2295]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.675000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2fc945a0 a2=0 a3=7ffe2fc9458c items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:49.680000 audit[2297]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:23:49.680000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe839e3c10 a2=0 a3=7ffe839e3bfc items=0 ppid=2166 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:49.717000 audit[2303]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:49.717000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffca6337870 a2=0 a3=7ffca633785c items=0 ppid=2166 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:49.727000 audit[2303]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:49.727000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffca6337870 a2=0 a3=7ffca633785c items=0 ppid=2166 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.727000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:49.730000 audit[2308]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.730000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd137209f0 a2=0 a3=7ffd137209dc items=0 ppid=2166 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:23:49.734000 audit[2310]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.734000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3abf4610 a2=0 a3=7ffe3abf45fc items=0 ppid=2166 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:23:49.740000 audit[2313]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.740000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9fea1290 a2=0 a3=7fff9fea127c items=0 ppid=2166 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:23:49.742000 audit[2314]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.742000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0b12e180 a2=0 a3=7ffc0b12e16c items=0 ppid=2166 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.742000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:23:49.746000 audit[2316]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.746000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffddcd8b40 a2=0 a3=7fffddcd8b2c items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:23:49.748000 audit[2317]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.748000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb9e9ccc0 a2=0 a3=7fffb9e9ccac items=0 ppid=2166 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:23:49.751000 audit[2319]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.751000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe93a47d90 a2=0 a3=7ffe93a47d7c items=0 ppid=2166 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:23:49.758000 audit[2322]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.758000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde35ebcc0 a2=0 a3=7ffde35ebcac items=0 ppid=2166 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:23:49.761000 audit[2323]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.761000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe23c57a20 a2=0 a3=7ffe23c57a0c items=0 ppid=2166 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:23:49.766000 audit[2325]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.766000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0345fc00 a2=0 a3=7ffc0345fbec items=0 ppid=2166 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:23:49.768000 audit[2326]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.768000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffce1c7c80 a2=0 a3=7fffce1c7c6c items=0 ppid=2166 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:23:49.773000 audit[2328]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.773000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe25509510 a2=0 a3=7ffe255094fc items=0 ppid=2166 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:23:49.780000 audit[2331]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.780000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb9e34cb0 a2=0 a3=7ffcb9e34c9c items=0 ppid=2166 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:23:49.787000 audit[2334]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.787000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff523195b0 a2=0 a3=7fff5231959c items=0 ppid=2166 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:23:49.791000 audit[2335]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.791000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde0bc4c20 a2=0 a3=7ffde0bc4c0c items=0 ppid=2166 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:23:49.796000 audit[2337]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.796000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd4ebfc8b0 a2=0 a3=7ffd4ebfc89c items=0 ppid=2166 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:49.803000 audit[2340]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.803000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdffe96820 a2=0 a3=7ffdffe9680c items=0 ppid=2166 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:23:49.805000 audit[2341]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.805000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea6db3150 a2=0 a3=7ffea6db313c items=0 ppid=2166 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:23:49.810000 audit[2343]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.810000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1cc2b650 a2=0 a3=7ffd1cc2b63c items=0 ppid=2166 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:23:49.812000 audit[2344]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.812000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff696ad990 a2=0 a3=7fff696ad97c items=0 ppid=2166 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:23:49.907000 audit[2346]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.907000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe959e2870 a2=0 a3=7ffe959e285c items=0 ppid=2166 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:49.979000 audit[2353]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:23:49.979000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe01eceb20 a2=0 a3=7ffe01eceb0c items=0 ppid=2166 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:23:49.987000 audit[2360]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:49.987000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc10c7eb90 a2=0 a3=7ffc10c7eb7c items=0 ppid=2166 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.987000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:49.987000 audit[2360]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:23:49.987000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc10c7eb90 a2=0 a3=7ffc10c7eb7c items=0 ppid=2166 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:49.987000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:49.997848 kubelet[2027]: I1213 14:23:49.997763 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-w5lk8" podStartSLOduration=1.99773595 podStartE2EDuration="1.99773595s" podCreationTimestamp="2024-12-13 14:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:23:49.953968969 +0000 UTC m=+6.313439273" watchObservedRunningTime="2024-12-13 14:23:49.99773595 +0000 UTC m=+6.357206253" Dec 13 14:23:50.074055 sudo[1437]: pam_unix(sudo:session): session closed for user root Dec 13 14:23:50.073000 audit[1437]: USER_END pid=1437 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:50.074000 audit[1437]: CRED_DISP pid=1437 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:23:50.116702 sshd[1434]: pam_unix(sshd:session): session closed for user core Dec 13 14:23:50.119000 audit[1434]: USER_END pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:50.119000 audit[1434]: CRED_DISP pid=1434 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:23:50.122330 systemd-logind[1222]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:23:50.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.77:22-139.178.68.195:35660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:50.123663 systemd[1]: sshd@6-10.128.0.77:22-139.178.68.195:35660.service: Deactivated successfully. Dec 13 14:23:50.124815 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:23:50.125023 systemd[1]: session-7.scope: Consumed 7.304s CPU time. Dec 13 14:23:50.125759 systemd-logind[1222]: Removed session 7. Dec 13 14:23:50.633732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3539526266.mount: Deactivated successfully. Dec 13 14:23:51.521594 env[1220]: time="2024-12-13T14:23:51.521524971Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:51.524234 env[1220]: time="2024-12-13T14:23:51.524186422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:51.526625 env[1220]: time="2024-12-13T14:23:51.526583854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:51.529081 env[1220]: time="2024-12-13T14:23:51.529044391Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:51.529871 env[1220]: time="2024-12-13T14:23:51.529821301Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:23:51.534628 env[1220]: time="2024-12-13T14:23:51.534586560Z" level=info msg="CreateContainer within sandbox \"7380397143e1fca37c096b66130b2d9b767dce85599551a5e9ba0c17601386c8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:23:51.552573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4235935171.mount: Deactivated successfully. Dec 13 14:23:51.553719 env[1220]: time="2024-12-13T14:23:51.553654570Z" level=info msg="CreateContainer within sandbox \"7380397143e1fca37c096b66130b2d9b767dce85599551a5e9ba0c17601386c8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e920458c58acc4d9fc309a1a7535db437a8c2083777cf71504b6de031d6bc26e\"" Dec 13 14:23:51.554954 env[1220]: time="2024-12-13T14:23:51.554909390Z" level=info msg="StartContainer for \"e920458c58acc4d9fc309a1a7535db437a8c2083777cf71504b6de031d6bc26e\"" Dec 13 14:23:51.593574 systemd[1]: run-containerd-runc-k8s.io-e920458c58acc4d9fc309a1a7535db437a8c2083777cf71504b6de031d6bc26e-runc.TcLURQ.mount: Deactivated successfully. Dec 13 14:23:51.598437 systemd[1]: Started cri-containerd-e920458c58acc4d9fc309a1a7535db437a8c2083777cf71504b6de031d6bc26e.scope. Dec 13 14:23:51.646279 kernel: kauditd_printk_skb: 320 callbacks suppressed Dec 13 14:23:51.646474 kernel: audit: type=1400 audit(1734099831.618:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.669328 kernel: audit: type=1400 audit(1734099831.618:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.697349 kernel: audit: type=1400 audit(1734099831.618:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.697510 kernel: audit: type=1400 audit(1734099831.618:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.714353 kernel: audit: type=1400 audit(1734099831.618:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.756596 kernel: audit: type=1400 audit(1734099831.618:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.777741 kernel: audit: type=1400 audit(1734099831.619:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.778517 env[1220]: time="2024-12-13T14:23:51.778462092Z" level=info msg="StartContainer for \"e920458c58acc4d9fc309a1a7535db437a8c2083777cf71504b6de031d6bc26e\" returns successfully" Dec 13 14:23:51.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.821185 kernel: audit: type=1400 audit(1734099831.619:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.821348 kernel: audit: type=1400 audit(1734099831.619:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.821433 kernel: audit: type=1400 audit(1734099831.645:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.645000 audit: BPF prog-id=114 op=LOAD Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2180 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323034353863353861636334643966633330396131613735333564 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2180 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323034353863353861636334643966633330396131613735333564 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit: BPF prog-id=115 op=LOAD Dec 13 14:23:51.646000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00032fd30 items=0 ppid=2180 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323034353863353861636334643966633330396131613735333564 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit: BPF prog-id=116 op=LOAD Dec 13 14:23:51.646000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00032fd78 items=0 ppid=2180 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323034353863353861636334643966633330396131613735333564 Dec 13 14:23:51.646000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:23:51.646000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { perfmon } for pid=2376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit[2376]: AVC avc: denied { bpf } for pid=2376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:51.646000 audit: BPF prog-id=117 op=LOAD Dec 13 14:23:51.646000 audit[2376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00037e188 items=0 ppid=2180 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:51.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539323034353863353861636334643966633330396131613735333564 Dec 13 14:23:54.914000 audit[2409]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:54.914000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc41aaa800 a2=0 a3=7ffc41aaa7ec items=0 ppid=2166 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:54.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:54.918000 audit[2409]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:54.918000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc41aaa800 a2=0 a3=0 items=0 ppid=2166 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:54.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:54.930000 audit[2411]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:54.930000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffb634dd50 a2=0 a3=7fffb634dd3c items=0 ppid=2166 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:54.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:54.936000 audit[2411]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:54.936000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb634dd50 a2=0 a3=0 items=0 ppid=2166 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:54.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:55.097490 kubelet[2027]: I1213 14:23:55.097408 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-zzp6m" podStartSLOduration=4.995209213 podStartE2EDuration="7.097357522s" podCreationTimestamp="2024-12-13 14:23:48 +0000 UTC" firstStartedPulling="2024-12-13 14:23:49.429564772 +0000 UTC m=+5.789035048" lastFinishedPulling="2024-12-13 14:23:51.531713079 +0000 UTC m=+7.891183357" observedRunningTime="2024-12-13 14:23:51.941031983 +0000 UTC m=+8.300502287" watchObservedRunningTime="2024-12-13 14:23:55.097357522 +0000 UTC m=+11.456827827" Dec 13 14:23:55.107478 systemd[1]: Created slice kubepods-besteffort-pod2d7dd15d_5e73_454c_bae7_b906ed21e667.slice. Dec 13 14:23:55.118267 kubelet[2027]: W1213 14:23:55.118218 2027 reflector.go:561] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object Dec 13 14:23:55.118537 kubelet[2027]: E1213 14:23:55.118492 2027 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"typha-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"typha-certs\" is forbidden: User \"system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 14:23:55.119175 kubelet[2027]: W1213 14:23:55.119144 2027 reflector.go:561] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object Dec 13 14:23:55.119388 kubelet[2027]: E1213 14:23:55.119355 2027 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"tigera-ca-bundle\" is forbidden: User \"system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 14:23:55.119858 kubelet[2027]: W1213 14:23:55.119836 2027 reflector.go:561] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object Dec 13 14:23:55.120028 kubelet[2027]: E1213 14:23:55.120000 2027 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' and this object" logger="UnhandledError" Dec 13 14:23:55.212756 kubelet[2027]: I1213 14:23:55.212567 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hgkb5\" (UniqueName: \"kubernetes.io/projected/2d7dd15d-5e73-454c-bae7-b906ed21e667-kube-api-access-hgkb5\") pod \"calico-typha-57876b748-pxghl\" (UID: \"2d7dd15d-5e73-454c-bae7-b906ed21e667\") " pod="calico-system/calico-typha-57876b748-pxghl" Dec 13 14:23:55.213118 kubelet[2027]: I1213 14:23:55.213077 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2d7dd15d-5e73-454c-bae7-b906ed21e667-typha-certs\") pod \"calico-typha-57876b748-pxghl\" (UID: \"2d7dd15d-5e73-454c-bae7-b906ed21e667\") " pod="calico-system/calico-typha-57876b748-pxghl" Dec 13 14:23:55.213313 kubelet[2027]: I1213 14:23:55.213269 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2d7dd15d-5e73-454c-bae7-b906ed21e667-tigera-ca-bundle\") pod \"calico-typha-57876b748-pxghl\" (UID: \"2d7dd15d-5e73-454c-bae7-b906ed21e667\") " pod="calico-system/calico-typha-57876b748-pxghl" Dec 13 14:23:55.317465 systemd[1]: Created slice kubepods-besteffort-pode4211b13_d6de_47b7_99b8_0714c124e265.slice. Dec 13 14:23:55.415061 kubelet[2027]: I1213 14:23:55.415002 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-policysync\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415284 kubelet[2027]: I1213 14:23:55.415071 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e4211b13-d6de-47b7-99b8-0714c124e265-node-certs\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415284 kubelet[2027]: I1213 14:23:55.415098 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-cni-log-dir\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415284 kubelet[2027]: I1213 14:23:55.415150 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-var-run-calico\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415284 kubelet[2027]: I1213 14:23:55.415178 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-var-lib-calico\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415284 kubelet[2027]: I1213 14:23:55.415209 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-cni-net-dir\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415574 kubelet[2027]: I1213 14:23:55.415239 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-cni-bin-dir\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415574 kubelet[2027]: I1213 14:23:55.415263 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-xtables-lock\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415574 kubelet[2027]: I1213 14:23:55.415324 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-flexvol-driver-host\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415574 kubelet[2027]: I1213 14:23:55.415353 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxm7k\" (UniqueName: \"kubernetes.io/projected/e4211b13-d6de-47b7-99b8-0714c124e265-kube-api-access-hxm7k\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415574 kubelet[2027]: I1213 14:23:55.415386 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e4211b13-d6de-47b7-99b8-0714c124e265-lib-modules\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.415834 kubelet[2027]: I1213 14:23:55.415414 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e4211b13-d6de-47b7-99b8-0714c124e265-tigera-ca-bundle\") pod \"calico-node-mjx85\" (UID: \"e4211b13-d6de-47b7-99b8-0714c124e265\") " pod="calico-system/calico-node-mjx85" Dec 13 14:23:55.453682 kubelet[2027]: E1213 14:23:55.453627 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:23:55.516013 kubelet[2027]: I1213 14:23:55.515885 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bda9bb98-0423-4678-b9df-cc75250bd3e5-registration-dir\") pod \"csi-node-driver-7hcsm\" (UID: \"bda9bb98-0423-4678-b9df-cc75250bd3e5\") " pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:23:55.516377 kubelet[2027]: I1213 14:23:55.516338 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bda9bb98-0423-4678-b9df-cc75250bd3e5-varrun\") pod \"csi-node-driver-7hcsm\" (UID: \"bda9bb98-0423-4678-b9df-cc75250bd3e5\") " pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:23:55.516576 kubelet[2027]: I1213 14:23:55.516554 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bda9bb98-0423-4678-b9df-cc75250bd3e5-socket-dir\") pod \"csi-node-driver-7hcsm\" (UID: \"bda9bb98-0423-4678-b9df-cc75250bd3e5\") " pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:23:55.516819 kubelet[2027]: I1213 14:23:55.516794 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zmpgc\" (UniqueName: \"kubernetes.io/projected/bda9bb98-0423-4678-b9df-cc75250bd3e5-kube-api-access-zmpgc\") pod \"csi-node-driver-7hcsm\" (UID: \"bda9bb98-0423-4678-b9df-cc75250bd3e5\") " pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:23:55.516979 kubelet[2027]: I1213 14:23:55.516957 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bda9bb98-0423-4678-b9df-cc75250bd3e5-kubelet-dir\") pod \"csi-node-driver-7hcsm\" (UID: \"bda9bb98-0423-4678-b9df-cc75250bd3e5\") " pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:23:55.530026 kubelet[2027]: E1213 14:23:55.529996 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.530227 kubelet[2027]: W1213 14:23:55.530204 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.530380 kubelet[2027]: E1213 14:23:55.530360 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.617993 kubelet[2027]: E1213 14:23:55.617956 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.618248 kubelet[2027]: W1213 14:23:55.618216 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.618410 kubelet[2027]: E1213 14:23:55.618387 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.618897 kubelet[2027]: E1213 14:23:55.618873 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.619063 kubelet[2027]: W1213 14:23:55.619043 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.619180 kubelet[2027]: E1213 14:23:55.619162 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.619673 kubelet[2027]: E1213 14:23:55.619652 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.619813 kubelet[2027]: W1213 14:23:55.619796 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.619898 kubelet[2027]: E1213 14:23:55.619886 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.620342 kubelet[2027]: E1213 14:23:55.620321 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.620490 kubelet[2027]: W1213 14:23:55.620469 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.620653 kubelet[2027]: E1213 14:23:55.620634 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.621277 kubelet[2027]: E1213 14:23:55.621257 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.621445 kubelet[2027]: W1213 14:23:55.621421 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.621617 kubelet[2027]: E1213 14:23:55.621596 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.622094 kubelet[2027]: E1213 14:23:55.622074 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.622222 kubelet[2027]: W1213 14:23:55.622202 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.622442 kubelet[2027]: E1213 14:23:55.622408 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.622861 kubelet[2027]: E1213 14:23:55.622841 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.622987 kubelet[2027]: W1213 14:23:55.622967 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.623112 kubelet[2027]: E1213 14:23:55.623092 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.623537 kubelet[2027]: E1213 14:23:55.623514 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.623537 kubelet[2027]: W1213 14:23:55.623533 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.623699 kubelet[2027]: E1213 14:23:55.623561 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.623930 kubelet[2027]: E1213 14:23:55.623893 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.623930 kubelet[2027]: W1213 14:23:55.623911 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.624075 kubelet[2027]: E1213 14:23:55.624038 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.625087 kubelet[2027]: E1213 14:23:55.624357 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.625087 kubelet[2027]: W1213 14:23:55.624374 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.625087 kubelet[2027]: E1213 14:23:55.624510 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.625087 kubelet[2027]: E1213 14:23:55.624722 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.625087 kubelet[2027]: W1213 14:23:55.624735 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.625087 kubelet[2027]: E1213 14:23:55.624853 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.625087 kubelet[2027]: E1213 14:23:55.625050 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.625087 kubelet[2027]: W1213 14:23:55.625063 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.625614 kubelet[2027]: E1213 14:23:55.625179 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.625614 kubelet[2027]: E1213 14:23:55.625391 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.625614 kubelet[2027]: W1213 14:23:55.625404 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.625614 kubelet[2027]: E1213 14:23:55.625526 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.625843 kubelet[2027]: E1213 14:23:55.625737 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.625843 kubelet[2027]: W1213 14:23:55.625748 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.625955 kubelet[2027]: E1213 14:23:55.625855 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.626443 kubelet[2027]: E1213 14:23:55.626049 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.626443 kubelet[2027]: W1213 14:23:55.626065 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.626443 kubelet[2027]: E1213 14:23:55.626178 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.626443 kubelet[2027]: E1213 14:23:55.626390 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.626443 kubelet[2027]: W1213 14:23:55.626402 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.626773 kubelet[2027]: E1213 14:23:55.626533 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.626773 kubelet[2027]: E1213 14:23:55.626752 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.626773 kubelet[2027]: W1213 14:23:55.626763 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.626942 kubelet[2027]: E1213 14:23:55.626872 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.627115 kubelet[2027]: E1213 14:23:55.627077 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.627115 kubelet[2027]: W1213 14:23:55.627094 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.627249 kubelet[2027]: E1213 14:23:55.627210 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.627910 kubelet[2027]: E1213 14:23:55.627872 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.627910 kubelet[2027]: W1213 14:23:55.627891 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.628075 kubelet[2027]: E1213 14:23:55.628025 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.628902 kubelet[2027]: E1213 14:23:55.628384 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.628902 kubelet[2027]: W1213 14:23:55.628401 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.628902 kubelet[2027]: E1213 14:23:55.628578 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.628902 kubelet[2027]: E1213 14:23:55.628802 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.628902 kubelet[2027]: W1213 14:23:55.628816 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.629247 kubelet[2027]: E1213 14:23:55.628987 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.629247 kubelet[2027]: E1213 14:23:55.629204 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.629247 kubelet[2027]: W1213 14:23:55.629220 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.629426 kubelet[2027]: E1213 14:23:55.629378 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.629627 kubelet[2027]: E1213 14:23:55.629588 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.629627 kubelet[2027]: W1213 14:23:55.629605 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.629790 kubelet[2027]: E1213 14:23:55.629718 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.630352 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.631568 kubelet[2027]: W1213 14:23:55.630371 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.630543 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.630893 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.631568 kubelet[2027]: W1213 14:23:55.630909 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.631025 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.631223 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.631568 kubelet[2027]: W1213 14:23:55.631236 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.631568 kubelet[2027]: E1213 14:23:55.631264 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.632040 kubelet[2027]: E1213 14:23:55.631653 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.632040 kubelet[2027]: W1213 14:23:55.631667 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.632040 kubelet[2027]: E1213 14:23:55.631689 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.632413 kubelet[2027]: E1213 14:23:55.632393 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.632541 kubelet[2027]: W1213 14:23:55.632521 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.632655 kubelet[2027]: E1213 14:23:55.632636 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.633078 kubelet[2027]: E1213 14:23:55.633058 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.633226 kubelet[2027]: W1213 14:23:55.633206 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.633382 kubelet[2027]: E1213 14:23:55.633362 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.633854 kubelet[2027]: E1213 14:23:55.633835 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.633985 kubelet[2027]: W1213 14:23:55.633966 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.634096 kubelet[2027]: E1213 14:23:55.634078 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.731259 kubelet[2027]: E1213 14:23:55.731210 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.731259 kubelet[2027]: W1213 14:23:55.731247 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.731593 kubelet[2027]: E1213 14:23:55.731277 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.731694 kubelet[2027]: E1213 14:23:55.731667 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.731794 kubelet[2027]: W1213 14:23:55.731695 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.731794 kubelet[2027]: E1213 14:23:55.731714 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.732053 kubelet[2027]: E1213 14:23:55.732028 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.732053 kubelet[2027]: W1213 14:23:55.732052 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.732245 kubelet[2027]: E1213 14:23:55.732070 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.732402 kubelet[2027]: E1213 14:23:55.732379 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.732402 kubelet[2027]: W1213 14:23:55.732400 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.732585 kubelet[2027]: E1213 14:23:55.732418 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.732756 kubelet[2027]: E1213 14:23:55.732731 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.732756 kubelet[2027]: W1213 14:23:55.732749 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.732940 kubelet[2027]: E1213 14:23:55.732775 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.733098 kubelet[2027]: E1213 14:23:55.733060 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.733098 kubelet[2027]: W1213 14:23:55.733081 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.733245 kubelet[2027]: E1213 14:23:55.733100 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.834088 kubelet[2027]: E1213 14:23:55.833961 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.834088 kubelet[2027]: W1213 14:23:55.833994 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.834088 kubelet[2027]: E1213 14:23:55.834019 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.836584 kubelet[2027]: E1213 14:23:55.836551 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.836584 kubelet[2027]: W1213 14:23:55.836581 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.836837 kubelet[2027]: E1213 14:23:55.836603 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.836953 kubelet[2027]: E1213 14:23:55.836931 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.836953 kubelet[2027]: W1213 14:23:55.836952 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.837119 kubelet[2027]: E1213 14:23:55.836971 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.837311 kubelet[2027]: E1213 14:23:55.837274 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.837311 kubelet[2027]: W1213 14:23:55.837311 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.837546 kubelet[2027]: E1213 14:23:55.837328 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.840607 kubelet[2027]: E1213 14:23:55.840578 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.840607 kubelet[2027]: W1213 14:23:55.840603 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.840793 kubelet[2027]: E1213 14:23:55.840622 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.842436 kubelet[2027]: E1213 14:23:55.842409 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.842436 kubelet[2027]: W1213 14:23:55.842435 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.842634 kubelet[2027]: E1213 14:23:55.842454 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.895941 kubelet[2027]: E1213 14:23:55.895906 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.895941 kubelet[2027]: W1213 14:23:55.895931 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.896227 kubelet[2027]: E1213 14:23:55.895956 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.896308 kubelet[2027]: E1213 14:23:55.896278 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.896369 kubelet[2027]: W1213 14:23:55.896312 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.896369 kubelet[2027]: E1213 14:23:55.896333 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.896672 kubelet[2027]: E1213 14:23:55.896646 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.896672 kubelet[2027]: W1213 14:23:55.896665 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.896865 kubelet[2027]: E1213 14:23:55.896683 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.896994 kubelet[2027]: E1213 14:23:55.896974 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.896994 kubelet[2027]: W1213 14:23:55.896994 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.897154 kubelet[2027]: E1213 14:23:55.897010 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.897419 kubelet[2027]: E1213 14:23:55.897399 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.897419 kubelet[2027]: W1213 14:23:55.897416 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.897578 kubelet[2027]: E1213 14:23:55.897432 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.897761 kubelet[2027]: E1213 14:23:55.897740 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.897761 kubelet[2027]: W1213 14:23:55.897758 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.897905 kubelet[2027]: E1213 14:23:55.897775 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.898094 kubelet[2027]: E1213 14:23:55.898076 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.898205 kubelet[2027]: W1213 14:23:55.898186 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.898422 kubelet[2027]: E1213 14:23:55.898401 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.898930 kubelet[2027]: E1213 14:23:55.898907 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.898930 kubelet[2027]: W1213 14:23:55.898925 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.899104 kubelet[2027]: E1213 14:23:55.898943 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.899267 kubelet[2027]: E1213 14:23:55.899246 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.899267 kubelet[2027]: W1213 14:23:55.899264 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.899474 kubelet[2027]: E1213 14:23:55.899281 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.899905 kubelet[2027]: E1213 14:23:55.899591 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.899905 kubelet[2027]: W1213 14:23:55.899607 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.899905 kubelet[2027]: E1213 14:23:55.899681 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.900139 kubelet[2027]: E1213 14:23:55.900006 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.900139 kubelet[2027]: W1213 14:23:55.900020 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.900139 kubelet[2027]: E1213 14:23:55.900035 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.900502 kubelet[2027]: E1213 14:23:55.900480 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.900502 kubelet[2027]: W1213 14:23:55.900498 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.900675 kubelet[2027]: E1213 14:23:55.900527 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.900878 kubelet[2027]: E1213 14:23:55.900857 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.900878 kubelet[2027]: W1213 14:23:55.900875 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.901015 kubelet[2027]: E1213 14:23:55.900892 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.901215 kubelet[2027]: E1213 14:23:55.901167 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.901215 kubelet[2027]: W1213 14:23:55.901185 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.901215 kubelet[2027]: E1213 14:23:55.901201 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.901583 kubelet[2027]: E1213 14:23:55.901551 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.901693 kubelet[2027]: W1213 14:23:55.901674 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.901792 kubelet[2027]: E1213 14:23:55.901698 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.902034 kubelet[2027]: E1213 14:23:55.902011 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.902034 kubelet[2027]: W1213 14:23:55.902033 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.902182 kubelet[2027]: E1213 14:23:55.902049 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.902386 kubelet[2027]: E1213 14:23:55.902365 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.902386 kubelet[2027]: W1213 14:23:55.902382 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.902537 kubelet[2027]: E1213 14:23:55.902399 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.902688 kubelet[2027]: E1213 14:23:55.902668 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.902688 kubelet[2027]: W1213 14:23:55.902686 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.902838 kubelet[2027]: E1213 14:23:55.902702 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.902993 kubelet[2027]: E1213 14:23:55.902973 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.902993 kubelet[2027]: W1213 14:23:55.902990 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.903122 kubelet[2027]: E1213 14:23:55.903008 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.903344 kubelet[2027]: E1213 14:23:55.903283 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.903344 kubelet[2027]: W1213 14:23:55.903342 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.903494 kubelet[2027]: E1213 14:23:55.903359 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.903676 kubelet[2027]: E1213 14:23:55.903655 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.903676 kubelet[2027]: W1213 14:23:55.903673 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.903807 kubelet[2027]: E1213 14:23:55.903689 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.903982 kubelet[2027]: E1213 14:23:55.903962 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.903982 kubelet[2027]: W1213 14:23:55.903979 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.904108 kubelet[2027]: E1213 14:23:55.903995 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.904318 kubelet[2027]: E1213 14:23:55.904280 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.904318 kubelet[2027]: W1213 14:23:55.904315 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.904451 kubelet[2027]: E1213 14:23:55.904332 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.904642 kubelet[2027]: E1213 14:23:55.904622 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.904642 kubelet[2027]: W1213 14:23:55.904640 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.904778 kubelet[2027]: E1213 14:23:55.904655 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.904950 kubelet[2027]: E1213 14:23:55.904930 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.904950 kubelet[2027]: W1213 14:23:55.904947 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.905075 kubelet[2027]: E1213 14:23:55.904963 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.943358 kubelet[2027]: E1213 14:23:55.943312 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.943358 kubelet[2027]: W1213 14:23:55.943338 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.943358 kubelet[2027]: E1213 14:23:55.943361 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.943722 kubelet[2027]: E1213 14:23:55.943698 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.943722 kubelet[2027]: W1213 14:23:55.943715 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.943722 kubelet[2027]: E1213 14:23:55.943733 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.944097 kubelet[2027]: E1213 14:23:55.944074 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.944097 kubelet[2027]: W1213 14:23:55.944093 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.944270 kubelet[2027]: E1213 14:23:55.944124 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.944470 kubelet[2027]: E1213 14:23:55.944447 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.944470 kubelet[2027]: W1213 14:23:55.944468 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.944614 kubelet[2027]: E1213 14:23:55.944488 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.947442 kubelet[2027]: E1213 14:23:55.947413 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.947442 kubelet[2027]: W1213 14:23:55.947438 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.947622 kubelet[2027]: E1213 14:23:55.947457 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.956166 kubelet[2027]: E1213 14:23:55.956144 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.956426 kubelet[2027]: W1213 14:23:55.956405 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.956832 kubelet[2027]: E1213 14:23:55.956622 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.957286 kubelet[2027]: E1213 14:23:55.957267 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:55.957446 kubelet[2027]: W1213 14:23:55.957426 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:55.957583 kubelet[2027]: E1213 14:23:55.957560 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:55.960000 audit[2490]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:55.960000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe804c8280 a2=0 a3=7ffe804c826c items=0 ppid=2166 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:55.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:55.965000 audit[2490]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:23:55.965000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe804c8280 a2=0 a3=0 items=0 ppid=2166 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:55.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:23:56.005911 kubelet[2027]: E1213 14:23:56.005864 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.005911 kubelet[2027]: W1213 14:23:56.005892 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.005911 kubelet[2027]: E1213 14:23:56.005920 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.006265 kubelet[2027]: E1213 14:23:56.006245 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.006379 kubelet[2027]: W1213 14:23:56.006269 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.006379 kubelet[2027]: E1213 14:23:56.006312 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.006640 kubelet[2027]: E1213 14:23:56.006615 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.006640 kubelet[2027]: W1213 14:23:56.006636 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.006804 kubelet[2027]: E1213 14:23:56.006655 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.006999 kubelet[2027]: E1213 14:23:56.006976 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.006999 kubelet[2027]: W1213 14:23:56.006995 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.007158 kubelet[2027]: E1213 14:23:56.007013 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.007358 kubelet[2027]: E1213 14:23:56.007334 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.007358 kubelet[2027]: W1213 14:23:56.007352 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.007537 kubelet[2027]: E1213 14:23:56.007370 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.007667 kubelet[2027]: E1213 14:23:56.007646 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.007667 kubelet[2027]: W1213 14:23:56.007663 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.007804 kubelet[2027]: E1213 14:23:56.007680 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.007980 kubelet[2027]: E1213 14:23:56.007960 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.007980 kubelet[2027]: W1213 14:23:56.007977 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.008113 kubelet[2027]: E1213 14:23:56.007993 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.008342 kubelet[2027]: E1213 14:23:56.008285 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.008342 kubelet[2027]: W1213 14:23:56.008339 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.008479 kubelet[2027]: E1213 14:23:56.008357 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.008662 kubelet[2027]: E1213 14:23:56.008642 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.008662 kubelet[2027]: W1213 14:23:56.008659 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.008823 kubelet[2027]: E1213 14:23:56.008675 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.008990 kubelet[2027]: E1213 14:23:56.008969 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.008990 kubelet[2027]: W1213 14:23:56.008987 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.009137 kubelet[2027]: E1213 14:23:56.009003 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.009337 kubelet[2027]: E1213 14:23:56.009282 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.009337 kubelet[2027]: W1213 14:23:56.009335 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.009477 kubelet[2027]: E1213 14:23:56.009353 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.009683 kubelet[2027]: E1213 14:23:56.009662 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.009683 kubelet[2027]: W1213 14:23:56.009679 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.009819 kubelet[2027]: E1213 14:23:56.009696 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.009997 kubelet[2027]: E1213 14:23:56.009977 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.009997 kubelet[2027]: W1213 14:23:56.009994 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.010127 kubelet[2027]: E1213 14:23:56.010011 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.010326 kubelet[2027]: E1213 14:23:56.010309 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.010412 kubelet[2027]: W1213 14:23:56.010328 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.010412 kubelet[2027]: E1213 14:23:56.010344 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.010648 kubelet[2027]: E1213 14:23:56.010628 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.010648 kubelet[2027]: W1213 14:23:56.010645 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.010778 kubelet[2027]: E1213 14:23:56.010661 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.058521 kubelet[2027]: E1213 14:23:56.058474 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.058521 kubelet[2027]: W1213 14:23:56.058502 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.058797 kubelet[2027]: E1213 14:23:56.058532 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.058922 kubelet[2027]: E1213 14:23:56.058900 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.058922 kubelet[2027]: W1213 14:23:56.058919 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.059047 kubelet[2027]: E1213 14:23:56.058939 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.059278 kubelet[2027]: E1213 14:23:56.059240 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.059278 kubelet[2027]: W1213 14:23:56.059260 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.059278 kubelet[2027]: E1213 14:23:56.059279 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.059680 kubelet[2027]: E1213 14:23:56.059657 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.059680 kubelet[2027]: W1213 14:23:56.059676 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.059833 kubelet[2027]: E1213 14:23:56.059695 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.060037 kubelet[2027]: E1213 14:23:56.060016 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.060037 kubelet[2027]: W1213 14:23:56.060034 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.060160 kubelet[2027]: E1213 14:23:56.060051 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.164909 kubelet[2027]: E1213 14:23:56.164876 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.165528 kubelet[2027]: W1213 14:23:56.165499 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.165664 kubelet[2027]: E1213 14:23:56.165644 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.166178 kubelet[2027]: E1213 14:23:56.166153 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.166178 kubelet[2027]: W1213 14:23:56.166174 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.166437 kubelet[2027]: E1213 14:23:56.166195 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.166560 kubelet[2027]: E1213 14:23:56.166538 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.166560 kubelet[2027]: W1213 14:23:56.166558 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.166698 kubelet[2027]: E1213 14:23:56.166581 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.166930 kubelet[2027]: E1213 14:23:56.166893 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.166930 kubelet[2027]: W1213 14:23:56.166912 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.167087 kubelet[2027]: E1213 14:23:56.166931 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.167267 kubelet[2027]: E1213 14:23:56.167246 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.167267 kubelet[2027]: W1213 14:23:56.167264 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.167414 kubelet[2027]: E1213 14:23:56.167283 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.268420 kubelet[2027]: E1213 14:23:56.268369 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.268420 kubelet[2027]: W1213 14:23:56.268400 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.268690 kubelet[2027]: E1213 14:23:56.268432 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.268871 kubelet[2027]: E1213 14:23:56.268838 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.268871 kubelet[2027]: W1213 14:23:56.268868 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.269033 kubelet[2027]: E1213 14:23:56.268894 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.269255 kubelet[2027]: E1213 14:23:56.269235 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.269255 kubelet[2027]: W1213 14:23:56.269252 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.269433 kubelet[2027]: E1213 14:23:56.269270 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.269619 kubelet[2027]: E1213 14:23:56.269597 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.269619 kubelet[2027]: W1213 14:23:56.269616 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.269755 kubelet[2027]: E1213 14:23:56.269634 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.269991 kubelet[2027]: E1213 14:23:56.269969 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.269991 kubelet[2027]: W1213 14:23:56.269987 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.270127 kubelet[2027]: E1213 14:23:56.270004 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.314154 kubelet[2027]: E1213 14:23:56.314095 2027 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.314403 kubelet[2027]: E1213 14:23:56.314249 2027 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/2d7dd15d-5e73-454c-bae7-b906ed21e667-tigera-ca-bundle podName:2d7dd15d-5e73-454c-bae7-b906ed21e667 nodeName:}" failed. No retries permitted until 2024-12-13 14:23:56.814200152 +0000 UTC m=+13.173670448 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/2d7dd15d-5e73-454c-bae7-b906ed21e667-tigera-ca-bundle") pod "calico-typha-57876b748-pxghl" (UID: "2d7dd15d-5e73-454c-bae7-b906ed21e667") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.333381 kubelet[2027]: E1213 14:23:56.333341 2027 projected.go:288] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.333677 kubelet[2027]: E1213 14:23:56.333653 2027 projected.go:194] Error preparing data for projected volume kube-api-access-hgkb5 for pod calico-system/calico-typha-57876b748-pxghl: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.333913 kubelet[2027]: E1213 14:23:56.333894 2027 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2d7dd15d-5e73-454c-bae7-b906ed21e667-kube-api-access-hgkb5 podName:2d7dd15d-5e73-454c-bae7-b906ed21e667 nodeName:}" failed. No retries permitted until 2024-12-13 14:23:56.833866655 +0000 UTC m=+13.193336958 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-hgkb5" (UniqueName: "kubernetes.io/projected/2d7dd15d-5e73-454c-bae7-b906ed21e667-kube-api-access-hgkb5") pod "calico-typha-57876b748-pxghl" (UID: "2d7dd15d-5e73-454c-bae7-b906ed21e667") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.371089 kubelet[2027]: E1213 14:23:56.371049 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.371089 kubelet[2027]: W1213 14:23:56.371078 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.371420 kubelet[2027]: E1213 14:23:56.371107 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.371508 kubelet[2027]: E1213 14:23:56.371480 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.371583 kubelet[2027]: W1213 14:23:56.371509 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.371583 kubelet[2027]: E1213 14:23:56.371530 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.371867 kubelet[2027]: E1213 14:23:56.371841 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.371867 kubelet[2027]: W1213 14:23:56.371862 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.372045 kubelet[2027]: E1213 14:23:56.371881 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.372266 kubelet[2027]: E1213 14:23:56.372229 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.372266 kubelet[2027]: W1213 14:23:56.372247 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.372266 kubelet[2027]: E1213 14:23:56.372266 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.372654 kubelet[2027]: E1213 14:23:56.372612 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.372654 kubelet[2027]: W1213 14:23:56.372631 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.372654 kubelet[2027]: E1213 14:23:56.372649 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.390041 kubelet[2027]: E1213 14:23:56.390003 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.390041 kubelet[2027]: W1213 14:23:56.390033 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.390278 kubelet[2027]: E1213 14:23:56.390058 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.473487 kubelet[2027]: E1213 14:23:56.473354 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.473487 kubelet[2027]: W1213 14:23:56.473388 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.473487 kubelet[2027]: E1213 14:23:56.473415 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.473791 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.474666 kubelet[2027]: W1213 14:23:56.473814 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.473835 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.474154 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.474666 kubelet[2027]: W1213 14:23:56.474168 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.474184 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.474541 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.474666 kubelet[2027]: W1213 14:23:56.474555 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.474666 kubelet[2027]: E1213 14:23:56.474582 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.541483 kubelet[2027]: E1213 14:23:56.541444 2027 projected.go:288] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.541483 kubelet[2027]: E1213 14:23:56.541485 2027 projected.go:194] Error preparing data for projected volume kube-api-access-hxm7k for pod calico-system/calico-node-mjx85: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.541735 kubelet[2027]: E1213 14:23:56.541571 2027 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/e4211b13-d6de-47b7-99b8-0714c124e265-kube-api-access-hxm7k podName:e4211b13-d6de-47b7-99b8-0714c124e265 nodeName:}" failed. No retries permitted until 2024-12-13 14:23:57.041547487 +0000 UTC m=+13.401017781 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-hxm7k" (UniqueName: "kubernetes.io/projected/e4211b13-d6de-47b7-99b8-0714c124e265-kube-api-access-hxm7k") pod "calico-node-mjx85" (UID: "e4211b13-d6de-47b7-99b8-0714c124e265") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.575927 kubelet[2027]: E1213 14:23:56.575887 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.575927 kubelet[2027]: W1213 14:23:56.575918 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.576184 kubelet[2027]: E1213 14:23:56.575946 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.576364 kubelet[2027]: E1213 14:23:56.576340 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.576364 kubelet[2027]: W1213 14:23:56.576361 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.576510 kubelet[2027]: E1213 14:23:56.576382 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.576757 kubelet[2027]: E1213 14:23:56.576711 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.576757 kubelet[2027]: W1213 14:23:56.576732 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.576757 kubelet[2027]: E1213 14:23:56.576750 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.577093 kubelet[2027]: E1213 14:23:56.577072 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.577093 kubelet[2027]: W1213 14:23:56.577089 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.577225 kubelet[2027]: E1213 14:23:56.577107 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.642389 kubelet[2027]: E1213 14:23:56.642343 2027 projected.go:288] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.642389 kubelet[2027]: E1213 14:23:56.642384 2027 projected.go:194] Error preparing data for projected volume kube-api-access-zmpgc for pod calico-system/csi-node-driver-7hcsm: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.642744 kubelet[2027]: E1213 14:23:56.642460 2027 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/bda9bb98-0423-4678-b9df-cc75250bd3e5-kube-api-access-zmpgc podName:bda9bb98-0423-4678-b9df-cc75250bd3e5 nodeName:}" failed. No retries permitted until 2024-12-13 14:23:57.142436658 +0000 UTC m=+13.501906941 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-zmpgc" (UniqueName: "kubernetes.io/projected/bda9bb98-0423-4678-b9df-cc75250bd3e5-kube-api-access-zmpgc") pod "csi-node-driver-7hcsm" (UID: "bda9bb98-0423-4678-b9df-cc75250bd3e5") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:23:56.678626 kubelet[2027]: E1213 14:23:56.678565 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.678626 kubelet[2027]: W1213 14:23:56.678595 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.678626 kubelet[2027]: E1213 14:23:56.678625 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.679066 kubelet[2027]: E1213 14:23:56.679041 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.679168 kubelet[2027]: W1213 14:23:56.679067 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.679168 kubelet[2027]: E1213 14:23:56.679091 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.679496 kubelet[2027]: E1213 14:23:56.679470 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.679496 kubelet[2027]: W1213 14:23:56.679489 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.679720 kubelet[2027]: E1213 14:23:56.679508 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.679864 kubelet[2027]: E1213 14:23:56.679838 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.679864 kubelet[2027]: W1213 14:23:56.679857 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.680002 kubelet[2027]: E1213 14:23:56.679873 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.781594 kubelet[2027]: E1213 14:23:56.781471 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.781879 kubelet[2027]: W1213 14:23:56.781847 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.782053 kubelet[2027]: E1213 14:23:56.782030 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.782588 kubelet[2027]: E1213 14:23:56.782566 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.782761 kubelet[2027]: W1213 14:23:56.782738 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.782884 kubelet[2027]: E1213 14:23:56.782865 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.785515 kubelet[2027]: E1213 14:23:56.785472 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.785515 kubelet[2027]: W1213 14:23:56.785494 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.785515 kubelet[2027]: E1213 14:23:56.785514 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.785878 kubelet[2027]: E1213 14:23:56.785851 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.785878 kubelet[2027]: W1213 14:23:56.785870 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.785998 kubelet[2027]: E1213 14:23:56.785887 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.887467 kubelet[2027]: E1213 14:23:56.887385 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.887467 kubelet[2027]: W1213 14:23:56.887414 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.887467 kubelet[2027]: E1213 14:23:56.887446 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.887861 kubelet[2027]: E1213 14:23:56.887800 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.887861 kubelet[2027]: W1213 14:23:56.887818 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.887861 kubelet[2027]: E1213 14:23:56.887840 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.888208 kubelet[2027]: E1213 14:23:56.888178 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.888208 kubelet[2027]: W1213 14:23:56.888203 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.888436 kubelet[2027]: E1213 14:23:56.888223 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.888637 kubelet[2027]: E1213 14:23:56.888603 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.888637 kubelet[2027]: W1213 14:23:56.888627 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.888812 kubelet[2027]: E1213 14:23:56.888651 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.889012 kubelet[2027]: E1213 14:23:56.888989 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.889012 kubelet[2027]: W1213 14:23:56.889011 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.889182 kubelet[2027]: E1213 14:23:56.889034 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.889396 kubelet[2027]: E1213 14:23:56.889373 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.889396 kubelet[2027]: W1213 14:23:56.889394 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.889566 kubelet[2027]: E1213 14:23:56.889417 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.889774 kubelet[2027]: E1213 14:23:56.889721 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.889774 kubelet[2027]: W1213 14:23:56.889741 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.889943 kubelet[2027]: E1213 14:23:56.889852 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.890088 kubelet[2027]: E1213 14:23:56.890068 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.890088 kubelet[2027]: W1213 14:23:56.890087 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.890250 kubelet[2027]: E1213 14:23:56.890112 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.890546 kubelet[2027]: E1213 14:23:56.890427 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.890546 kubelet[2027]: W1213 14:23:56.890442 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.890546 kubelet[2027]: E1213 14:23:56.890463 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.890777 kubelet[2027]: E1213 14:23:56.890756 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.890841 kubelet[2027]: W1213 14:23:56.890777 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.890841 kubelet[2027]: E1213 14:23:56.890799 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.891207 kubelet[2027]: E1213 14:23:56.891181 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.891207 kubelet[2027]: W1213 14:23:56.891203 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.891393 kubelet[2027]: E1213 14:23:56.891373 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.893783 kubelet[2027]: E1213 14:23:56.891986 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.893783 kubelet[2027]: W1213 14:23:56.892005 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.893783 kubelet[2027]: E1213 14:23:56.892022 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.897554 kubelet[2027]: E1213 14:23:56.897525 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.897554 kubelet[2027]: W1213 14:23:56.897549 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.897718 kubelet[2027]: E1213 14:23:56.897570 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.922050 kubelet[2027]: E1213 14:23:56.922019 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.922050 kubelet[2027]: W1213 14:23:56.922044 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.922226 kubelet[2027]: E1213 14:23:56.922068 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.989793 kubelet[2027]: E1213 14:23:56.989747 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.989793 kubelet[2027]: W1213 14:23:56.989774 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.989793 kubelet[2027]: E1213 14:23:56.989803 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:56.990211 kubelet[2027]: E1213 14:23:56.990186 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:56.990211 kubelet[2027]: W1213 14:23:56.990207 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:56.990403 kubelet[2027]: E1213 14:23:56.990229 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.091094 kubelet[2027]: E1213 14:23:57.090974 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.091094 kubelet[2027]: W1213 14:23:57.091001 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.091094 kubelet[2027]: E1213 14:23:57.091028 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.091464 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.094457 kubelet[2027]: W1213 14:23:57.091483 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.091510 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.091845 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.094457 kubelet[2027]: W1213 14:23:57.091858 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.091874 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.092162 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.094457 kubelet[2027]: W1213 14:23:57.092174 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.092189 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.094457 kubelet[2027]: E1213 14:23:57.092476 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.095079 kubelet[2027]: W1213 14:23:57.092489 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.095079 kubelet[2027]: E1213 14:23:57.092505 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.095079 kubelet[2027]: E1213 14:23:57.092807 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.095079 kubelet[2027]: W1213 14:23:57.092824 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.095079 kubelet[2027]: E1213 14:23:57.092839 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.105417 kubelet[2027]: E1213 14:23:57.105379 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.105417 kubelet[2027]: W1213 14:23:57.105400 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.105417 kubelet[2027]: E1213 14:23:57.105420 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.123340 env[1220]: time="2024-12-13T14:23:57.123255022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mjx85,Uid:e4211b13-d6de-47b7-99b8-0714c124e265,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:57.155695 env[1220]: time="2024-12-13T14:23:57.155578972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:57.155695 env[1220]: time="2024-12-13T14:23:57.155654085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:57.156999 env[1220]: time="2024-12-13T14:23:57.156015157Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:57.156999 env[1220]: time="2024-12-13T14:23:57.156773659Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3 pid=2576 runtime=io.containerd.runc.v2 Dec 13 14:23:57.192725 kubelet[2027]: E1213 14:23:57.192688 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.192725 kubelet[2027]: W1213 14:23:57.192715 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.193415 kubelet[2027]: E1213 14:23:57.192745 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.194373 kubelet[2027]: E1213 14:23:57.193702 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.194373 kubelet[2027]: W1213 14:23:57.193721 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.194373 kubelet[2027]: E1213 14:23:57.193743 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.195074 kubelet[2027]: E1213 14:23:57.195028 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.195074 kubelet[2027]: W1213 14:23:57.195056 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.195074 kubelet[2027]: E1213 14:23:57.195076 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.196140 kubelet[2027]: E1213 14:23:57.196007 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.196140 kubelet[2027]: W1213 14:23:57.196025 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.196140 kubelet[2027]: E1213 14:23:57.196044 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.196510 kubelet[2027]: E1213 14:23:57.196428 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.196510 kubelet[2027]: W1213 14:23:57.196443 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.196510 kubelet[2027]: E1213 14:23:57.196460 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.204766 kubelet[2027]: E1213 14:23:57.204695 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:23:57.204766 kubelet[2027]: W1213 14:23:57.204713 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:23:57.204766 kubelet[2027]: E1213 14:23:57.204733 2027 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:23:57.207542 systemd[1]: Started cri-containerd-3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3.scope. Dec 13 14:23:57.217540 env[1220]: time="2024-12-13T14:23:57.217478599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57876b748-pxghl,Uid:2d7dd15d-5e73-454c-bae7-b906ed21e667,Namespace:calico-system,Attempt:0,}" Dec 13 14:23:57.277179 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 14:23:57.277573 kernel: audit: type=1400 audit(1734099837.247:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.278441 env[1220]: time="2024-12-13T14:23:57.256020299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:23:57.278441 env[1220]: time="2024-12-13T14:23:57.256106739Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:23:57.278441 env[1220]: time="2024-12-13T14:23:57.256143768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:23:57.278441 env[1220]: time="2024-12-13T14:23:57.256338176Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d53cd67a1916f60021cf6fd8cc23cf44691ca8b372ca5f4ff72879d85e814f0 pid=2618 runtime=io.containerd.runc.v2 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.307208 systemd[1]: Started cri-containerd-7d53cd67a1916f60021cf6fd8cc23cf44691ca8b372ca5f4ff72879d85e814f0.scope. Dec 13 14:23:57.317809 kernel: audit: type=1400 audit(1734099837.247:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.389231 kernel: audit: type=1400 audit(1734099837.247:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.389434 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:23:57.389479 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:23:57.389512 kernel: audit: backlog limit exceeded Dec 13 14:23:57.389557 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:23:57.389587 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:23:57.389617 kernel: audit: type=1400 audit(1734099837.247:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.389648 kernel: audit: backlog limit exceeded Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.398276 env[1220]: time="2024-12-13T14:23:57.398223551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mjx85,Uid:e4211b13-d6de-47b7-99b8-0714c124e265,Namespace:calico-system,Attempt:0,} returns sandbox id \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\"" Dec 13 14:23:57.401034 env[1220]: time="2024-12-13T14:23:57.400993416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.248000 audit: BPF prog-id=118 op=LOAD Dec 13 14:23:57.280000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.280000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2576 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363839346566393963333734323665623562393030613265636535 Dec 13 14:23:57.280000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.280000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2576 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363839346566393963333734323665623562393030613265636535 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit: BPF prog-id=119 op=LOAD Dec 13 14:23:57.281000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a0aa0 items=0 ppid=2576 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363839346566393963333734323665623562393030613265636535 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit: BPF prog-id=120 op=LOAD Dec 13 14:23:57.281000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a0ae8 items=0 ppid=2576 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363839346566393963333734323665623562393030613265636535 Dec 13 14:23:57.281000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:23:57.281000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.281000 audit: BPF prog-id=121 op=LOAD Dec 13 14:23:57.281000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a0ef8 items=0 ppid=2576 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:57.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363839346566393963333734323665623562393030613265636535 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:57.450016 env[1220]: time="2024-12-13T14:23:57.449965869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57876b748-pxghl,Uid:2d7dd15d-5e73-454c-bae7-b906ed21e667,Namespace:calico-system,Attempt:0,} returns sandbox id \"7d53cd67a1916f60021cf6fd8cc23cf44691ca8b372ca5f4ff72879d85e814f0\"" Dec 13 14:23:57.849441 kubelet[2027]: E1213 14:23:57.848505 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:23:58.335626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount111072123.mount: Deactivated successfully. Dec 13 14:23:58.498513 env[1220]: time="2024-12-13T14:23:58.498447736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:58.501165 env[1220]: time="2024-12-13T14:23:58.501094644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:58.503952 env[1220]: time="2024-12-13T14:23:58.503913943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:58.506055 env[1220]: time="2024-12-13T14:23:58.505991564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:23:58.507021 env[1220]: time="2024-12-13T14:23:58.506982943Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:23:58.509771 env[1220]: time="2024-12-13T14:23:58.509734040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:23:58.511279 env[1220]: time="2024-12-13T14:23:58.511241935Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:23:58.533661 env[1220]: time="2024-12-13T14:23:58.533605101Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75\"" Dec 13 14:23:58.535852 env[1220]: time="2024-12-13T14:23:58.534461612Z" level=info msg="StartContainer for \"5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75\"" Dec 13 14:23:58.562319 systemd[1]: Started cri-containerd-5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75.scope. Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5b647cfba8 items=0 ppid=2576 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:58.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343462633564643664646365653334346666313630376661313531 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.589000 audit: BPF prog-id=126 op=LOAD Dec 13 14:23:58.589000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030eaf8 items=0 ppid=2576 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:58.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343462633564643664646365653334346666313630376661313531 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit: BPF prog-id=127 op=LOAD Dec 13 14:23:58.590000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030eb48 items=0 ppid=2576 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:58.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343462633564643664646365653334346666313630376661313531 Dec 13 14:23:58.590000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:23:58.590000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:23:58.590000 audit: BPF prog-id=128 op=LOAD Dec 13 14:23:58.590000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030ebd8 items=0 ppid=2576 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:58.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343462633564643664646365653334346666313630376661313531 Dec 13 14:23:58.618086 env[1220]: time="2024-12-13T14:23:58.615447814Z" level=info msg="StartContainer for \"5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75\" returns successfully" Dec 13 14:23:58.629343 systemd[1]: cri-containerd-5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75.scope: Deactivated successfully. Dec 13 14:23:58.631000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:23:58.915463 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75-rootfs.mount: Deactivated successfully. Dec 13 14:23:58.987753 env[1220]: time="2024-12-13T14:23:58.987691077Z" level=info msg="shim disconnected" id=5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75 Dec 13 14:23:58.988088 env[1220]: time="2024-12-13T14:23:58.988041174Z" level=warning msg="cleaning up after shim disconnected" id=5244bc5dd6ddcee344ff1607fa151ca1e34d034fcada6f858d96bc85524dda75 namespace=k8s.io Dec 13 14:23:58.988088 env[1220]: time="2024-12-13T14:23:58.988081652Z" level=info msg="cleaning up dead shim" Dec 13 14:23:59.001384 env[1220]: time="2024-12-13T14:23:59.001331163Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:23:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2711 runtime=io.containerd.runc.v2\n" Dec 13 14:23:59.847673 kubelet[2027]: E1213 14:23:59.847605 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:00.640065 env[1220]: time="2024-12-13T14:24:00.639988623Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:00.642655 env[1220]: time="2024-12-13T14:24:00.642607436Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:00.644808 env[1220]: time="2024-12-13T14:24:00.644765688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:00.646792 env[1220]: time="2024-12-13T14:24:00.646750119Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:00.647555 env[1220]: time="2024-12-13T14:24:00.647509921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:24:00.652797 env[1220]: time="2024-12-13T14:24:00.652763017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:24:00.679765 env[1220]: time="2024-12-13T14:24:00.679590935Z" level=info msg="CreateContainer within sandbox \"7d53cd67a1916f60021cf6fd8cc23cf44691ca8b372ca5f4ff72879d85e814f0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:24:00.701177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount812077640.mount: Deactivated successfully. Dec 13 14:24:00.708474 env[1220]: time="2024-12-13T14:24:00.708426868Z" level=info msg="CreateContainer within sandbox \"7d53cd67a1916f60021cf6fd8cc23cf44691ca8b372ca5f4ff72879d85e814f0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3cc269ce0420480d67349ee4c248b428803d8e97085e62c4d6cf7fa44e6a46f8\"" Dec 13 14:24:00.711948 env[1220]: time="2024-12-13T14:24:00.711897878Z" level=info msg="StartContainer for \"3cc269ce0420480d67349ee4c248b428803d8e97085e62c4d6cf7fa44e6a46f8\"" Dec 13 14:24:00.748877 systemd[1]: Started cri-containerd-3cc269ce0420480d67349ee4c248b428803d8e97085e62c4d6cf7fa44e6a46f8.scope. Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.771000 audit: BPF prog-id=129 op=LOAD Dec 13 14:24:00.772000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.772000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2618 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:00.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633236396365303432303438306436373334396565346332343862 Dec 13 14:24:00.772000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.772000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2618 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:00.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633236396365303432303438306436373334396565346332343862 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit: BPF prog-id=130 op=LOAD Dec 13 14:24:00.773000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025dd10 items=0 ppid=2618 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:00.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633236396365303432303438306436373334396565346332343862 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit: BPF prog-id=131 op=LOAD Dec 13 14:24:00.773000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025dd58 items=0 ppid=2618 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:00.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633236396365303432303438306436373334396565346332343862 Dec 13 14:24:00.773000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:24:00.773000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:00.773000 audit: BPF prog-id=132 op=LOAD Dec 13 14:24:00.773000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8168 items=0 ppid=2618 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:00.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363633236396365303432303438306436373334396565346332343862 Dec 13 14:24:00.822329 env[1220]: time="2024-12-13T14:24:00.820740892Z" level=info msg="StartContainer for \"3cc269ce0420480d67349ee4c248b428803d8e97085e62c4d6cf7fa44e6a46f8\" returns successfully" Dec 13 14:24:01.846707 kubelet[2027]: E1213 14:24:01.846655 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:01.954114 kubelet[2027]: I1213 14:24:01.954071 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:03.848609 kubelet[2027]: E1213 14:24:03.848560 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:04.097180 kubelet[2027]: I1213 14:24:04.097123 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:04.120395 kubelet[2027]: I1213 14:24:04.119695 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57876b748-pxghl" podStartSLOduration=5.922526183 podStartE2EDuration="9.119667522s" podCreationTimestamp="2024-12-13 14:23:55 +0000 UTC" firstStartedPulling="2024-12-13 14:23:57.451625693 +0000 UTC m=+13.811095969" lastFinishedPulling="2024-12-13 14:24:00.648767012 +0000 UTC m=+17.008237308" observedRunningTime="2024-12-13 14:24:00.983151336 +0000 UTC m=+17.342621640" watchObservedRunningTime="2024-12-13 14:24:04.119667522 +0000 UTC m=+20.479137828" Dec 13 14:24:04.199000 audit[2767]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:04.222123 kernel: kauditd_printk_skb: 273 callbacks suppressed Dec 13 14:24:04.222347 kernel: audit: type=1325 audit(1734099844.199:973): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:04.199000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc8b3aa570 a2=0 a3=7ffc8b3aa55c items=0 ppid=2166 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.271356 kernel: audit: type=1300 audit(1734099844.199:973): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc8b3aa570 a2=0 a3=7ffc8b3aa55c items=0 ppid=2166 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.271504 kernel: audit: type=1327 audit(1734099844.199:973): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:04.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:04.287781 kernel: audit: type=1325 audit(1734099844.255:974): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:04.255000 audit[2767]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:04.321051 kernel: audit: type=1300 audit(1734099844.255:974): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc8b3aa570 a2=0 a3=7ffc8b3aa55c items=0 ppid=2166 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.255000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc8b3aa570 a2=0 a3=7ffc8b3aa55c items=0 ppid=2166 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:04.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:04.337311 kernel: audit: type=1327 audit(1734099844.255:974): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:05.461448 env[1220]: time="2024-12-13T14:24:05.461383106Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:05.464350 env[1220]: time="2024-12-13T14:24:05.464276531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:05.466577 env[1220]: time="2024-12-13T14:24:05.466537621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:05.468651 env[1220]: time="2024-12-13T14:24:05.468606956Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:05.469453 env[1220]: time="2024-12-13T14:24:05.469410023Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:24:05.474377 env[1220]: time="2024-12-13T14:24:05.474334027Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:24:05.494710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2621242263.mount: Deactivated successfully. Dec 13 14:24:05.501723 env[1220]: time="2024-12-13T14:24:05.501662713Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384\"" Dec 13 14:24:05.504042 env[1220]: time="2024-12-13T14:24:05.503981862Z" level=info msg="StartContainer for \"5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384\"" Dec 13 14:24:05.553484 systemd[1]: run-containerd-runc-k8s.io-5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384-runc.ixxMru.mount: Deactivated successfully. Dec 13 14:24:05.558572 systemd[1]: Started cri-containerd-5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384.scope. Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f992d2db918 items=0 ppid=2576 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:05.639450 kernel: audit: type=1400 audit(1734099845.581:975): avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.639627 kernel: audit: type=1300 audit(1734099845.581:975): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f992d2db918 items=0 ppid=2576 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:05.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613535386233333736666361613630363833666165303461623737 Dec 13 14:24:05.672943 env[1220]: time="2024-12-13T14:24:05.646852165Z" level=info msg="StartContainer for \"5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384\" returns successfully" Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.693670 kernel: audit: type=1327 audit(1734099845.581:975): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613535386233333736666361613630363833666165303461623737 Dec 13 14:24:05.693817 kernel: audit: type=1400 audit(1734099845.581:976): avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.581000 audit: BPF prog-id=133 op=LOAD Dec 13 14:24:05.581000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000353dc8 items=0 ppid=2576 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:05.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613535386233333736666361613630363833666165303461623737 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit: BPF prog-id=134 op=LOAD Dec 13 14:24:05.582000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000353e18 items=0 ppid=2576 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:05.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613535386233333736666361613630363833666165303461623737 Dec 13 14:24:05.582000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:24:05.582000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:05.582000 audit: BPF prog-id=135 op=LOAD Dec 13 14:24:05.582000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000353ea8 items=0 ppid=2576 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:05.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613535386233333736666361613630363833666165303461623737 Dec 13 14:24:05.847744 kubelet[2027]: E1213 14:24:05.847585 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:06.591143 env[1220]: time="2024-12-13T14:24:06.591062452Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:24:06.593543 systemd[1]: cri-containerd-5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384.scope: Deactivated successfully. Dec 13 14:24:06.596000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:24:06.625323 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384-rootfs.mount: Deactivated successfully. Dec 13 14:24:06.641139 kubelet[2027]: I1213 14:24:06.640949 2027 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:24:06.688924 systemd[1]: Created slice kubepods-burstable-podb06d3a28_6e3f_4f05_93f2_51de207fe5d1.slice. Dec 13 14:24:06.716311 systemd[1]: Created slice kubepods-burstable-pod7faf7cd7_0eb2_42a0_9296_9fc39fabbdc4.slice. Dec 13 14:24:06.739093 systemd[1]: Created slice kubepods-besteffort-podf5155243_e16e_49bf_95ae_9a9cc29afed5.slice. Dec 13 14:24:06.749332 systemd[1]: Created slice kubepods-besteffort-podfbe07029_5ff3_460c_9ac9_3105743263ff.slice. Dec 13 14:24:06.822496 kubelet[2027]: I1213 14:24:06.759910 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f5155243-e16e-49bf-95ae-9a9cc29afed5-calico-apiserver-certs\") pod \"calico-apiserver-768cdbc847-lf68x\" (UID: \"f5155243-e16e-49bf-95ae-9a9cc29afed5\") " pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" Dec 13 14:24:06.822496 kubelet[2027]: I1213 14:24:06.759959 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-njdzt\" (UniqueName: \"kubernetes.io/projected/eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe-kube-api-access-njdzt\") pod \"calico-apiserver-768cdbc847-fl59n\" (UID: \"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe\") " pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" Dec 13 14:24:06.822496 kubelet[2027]: I1213 14:24:06.760044 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe-calico-apiserver-certs\") pod \"calico-apiserver-768cdbc847-fl59n\" (UID: \"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe\") " pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" Dec 13 14:24:06.822496 kubelet[2027]: I1213 14:24:06.760085 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fbe07029-5ff3-460c-9ac9-3105743263ff-tigera-ca-bundle\") pod \"calico-kube-controllers-94d48fcdf-2qzfk\" (UID: \"fbe07029-5ff3-460c-9ac9-3105743263ff\") " pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" Dec 13 14:24:06.822496 kubelet[2027]: I1213 14:24:06.760125 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xbbkt\" (UniqueName: \"kubernetes.io/projected/7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4-kube-api-access-xbbkt\") pod \"coredns-6f6b679f8f-8kt96\" (UID: \"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4\") " pod="kube-system/coredns-6f6b679f8f-8kt96" Dec 13 14:24:06.762422 systemd[1]: Created slice kubepods-besteffort-podeafc9c4c_6ca8_4947_a6e9_5fcd93d6fdbe.slice. Dec 13 14:24:06.822959 kubelet[2027]: I1213 14:24:06.760153 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mzt7t\" (UniqueName: \"kubernetes.io/projected/fbe07029-5ff3-460c-9ac9-3105743263ff-kube-api-access-mzt7t\") pod \"calico-kube-controllers-94d48fcdf-2qzfk\" (UID: \"fbe07029-5ff3-460c-9ac9-3105743263ff\") " pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" Dec 13 14:24:06.822959 kubelet[2027]: I1213 14:24:06.760184 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b06d3a28-6e3f-4f05-93f2-51de207fe5d1-config-volume\") pod \"coredns-6f6b679f8f-vvpdj\" (UID: \"b06d3a28-6e3f-4f05-93f2-51de207fe5d1\") " pod="kube-system/coredns-6f6b679f8f-vvpdj" Dec 13 14:24:06.822959 kubelet[2027]: I1213 14:24:06.760212 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scvj6\" (UniqueName: \"kubernetes.io/projected/b06d3a28-6e3f-4f05-93f2-51de207fe5d1-kube-api-access-scvj6\") pod \"coredns-6f6b679f8f-vvpdj\" (UID: \"b06d3a28-6e3f-4f05-93f2-51de207fe5d1\") " pod="kube-system/coredns-6f6b679f8f-vvpdj" Dec 13 14:24:06.822959 kubelet[2027]: I1213 14:24:06.760244 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4-config-volume\") pod \"coredns-6f6b679f8f-8kt96\" (UID: \"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4\") " pod="kube-system/coredns-6f6b679f8f-8kt96" Dec 13 14:24:06.822959 kubelet[2027]: I1213 14:24:06.760277 2027 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d9nc5\" (UniqueName: \"kubernetes.io/projected/f5155243-e16e-49bf-95ae-9a9cc29afed5-kube-api-access-d9nc5\") pod \"calico-apiserver-768cdbc847-lf68x\" (UID: \"f5155243-e16e-49bf-95ae-9a9cc29afed5\") " pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" Dec 13 14:24:06.998240 env[1220]: time="2024-12-13T14:24:06.998114586Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vvpdj,Uid:b06d3a28-6e3f-4f05-93f2-51de207fe5d1,Namespace:kube-system,Attempt:0,}" Dec 13 14:24:07.027575 env[1220]: time="2024-12-13T14:24:07.027498691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-8kt96,Uid:7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4,Namespace:kube-system,Attempt:0,}" Dec 13 14:24:07.126018 env[1220]: time="2024-12-13T14:24:07.125348393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-94d48fcdf-2qzfk,Uid:fbe07029-5ff3-460c-9ac9-3105743263ff,Namespace:calico-system,Attempt:0,}" Dec 13 14:24:07.126018 env[1220]: time="2024-12-13T14:24:07.125616401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-fl59n,Uid:eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:24:07.126018 env[1220]: time="2024-12-13T14:24:07.125846695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-lf68x,Uid:f5155243-e16e-49bf-95ae-9a9cc29afed5,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:24:07.672039 env[1220]: time="2024-12-13T14:24:07.671925333Z" level=info msg="shim disconnected" id=5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384 Dec 13 14:24:07.672684 env[1220]: time="2024-12-13T14:24:07.672083433Z" level=warning msg="cleaning up after shim disconnected" id=5ea558b3376fcaa60683fae04ab7771588a5f00c82e62d6f729b90d756a7e384 namespace=k8s.io Dec 13 14:24:07.672684 env[1220]: time="2024-12-13T14:24:07.672102184Z" level=info msg="cleaning up dead shim" Dec 13 14:24:07.686128 env[1220]: time="2024-12-13T14:24:07.686074152Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:24:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2827 runtime=io.containerd.runc.v2\n" Dec 13 14:24:07.857623 systemd[1]: Created slice kubepods-besteffort-podbda9bb98_0423_4678_b9df_cc75250bd3e5.slice. Dec 13 14:24:07.865570 env[1220]: time="2024-12-13T14:24:07.865516923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7hcsm,Uid:bda9bb98-0423-4678-b9df-cc75250bd3e5,Namespace:calico-system,Attempt:0,}" Dec 13 14:24:07.987382 env[1220]: time="2024-12-13T14:24:07.984780998Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:24:08.066540 env[1220]: time="2024-12-13T14:24:08.066449300Z" level=error msg="Failed to destroy network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.066988 env[1220]: time="2024-12-13T14:24:08.066935426Z" level=error msg="encountered an error cleaning up failed sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.067157 env[1220]: time="2024-12-13T14:24:08.067021708Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-94d48fcdf-2qzfk,Uid:fbe07029-5ff3-460c-9ac9-3105743263ff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.068461 kubelet[2027]: E1213 14:24:08.067594 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.068461 kubelet[2027]: E1213 14:24:08.067715 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" Dec 13 14:24:08.068461 kubelet[2027]: E1213 14:24:08.067843 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" Dec 13 14:24:08.069077 kubelet[2027]: E1213 14:24:08.067956 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-94d48fcdf-2qzfk_calico-system(fbe07029-5ff3-460c-9ac9-3105743263ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-94d48fcdf-2qzfk_calico-system(fbe07029-5ff3-460c-9ac9-3105743263ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" podUID="fbe07029-5ff3-460c-9ac9-3105743263ff" Dec 13 14:24:08.079574 env[1220]: time="2024-12-13T14:24:08.079500893Z" level=error msg="Failed to destroy network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.080322 env[1220]: time="2024-12-13T14:24:08.080241205Z" level=error msg="encountered an error cleaning up failed sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.080646 env[1220]: time="2024-12-13T14:24:08.080585147Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-8kt96,Uid:7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.081792 kubelet[2027]: E1213 14:24:08.081070 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.081792 kubelet[2027]: E1213 14:24:08.081156 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-8kt96" Dec 13 14:24:08.081792 kubelet[2027]: E1213 14:24:08.081222 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-8kt96" Dec 13 14:24:08.082210 kubelet[2027]: E1213 14:24:08.081700 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-8kt96_kube-system(7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-8kt96_kube-system(7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-8kt96" podUID="7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4" Dec 13 14:24:08.129009 env[1220]: time="2024-12-13T14:24:08.128830930Z" level=error msg="Failed to destroy network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.129758 env[1220]: time="2024-12-13T14:24:08.129698024Z" level=error msg="encountered an error cleaning up failed sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.130030 env[1220]: time="2024-12-13T14:24:08.129971810Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7hcsm,Uid:bda9bb98-0423-4678-b9df-cc75250bd3e5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.131201 kubelet[2027]: E1213 14:24:08.130469 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.131201 kubelet[2027]: E1213 14:24:08.130579 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:24:08.131201 kubelet[2027]: E1213 14:24:08.130615 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7hcsm" Dec 13 14:24:08.131635 kubelet[2027]: E1213 14:24:08.130714 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7hcsm_calico-system(bda9bb98-0423-4678-b9df-cc75250bd3e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7hcsm_calico-system(bda9bb98-0423-4678-b9df-cc75250bd3e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:08.171486 env[1220]: time="2024-12-13T14:24:08.171415545Z" level=error msg="Failed to destroy network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.172430 env[1220]: time="2024-12-13T14:24:08.172371343Z" level=error msg="Failed to destroy network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.173006 env[1220]: time="2024-12-13T14:24:08.172957446Z" level=error msg="encountered an error cleaning up failed sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.173251 env[1220]: time="2024-12-13T14:24:08.173204834Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vvpdj,Uid:b06d3a28-6e3f-4f05-93f2-51de207fe5d1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.173539 env[1220]: time="2024-12-13T14:24:08.172399790Z" level=error msg="encountered an error cleaning up failed sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.173654 env[1220]: time="2024-12-13T14:24:08.173543919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-lf68x,Uid:f5155243-e16e-49bf-95ae-9a9cc29afed5,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.173783 env[1220]: time="2024-12-13T14:24:08.173646154Z" level=error msg="Failed to destroy network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.174129 env[1220]: time="2024-12-13T14:24:08.174081528Z" level=error msg="encountered an error cleaning up failed sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.174240 kubelet[2027]: E1213 14:24:08.174110 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.174240 kubelet[2027]: E1213 14:24:08.174209 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.174424 kubelet[2027]: E1213 14:24:08.174324 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vvpdj" Dec 13 14:24:08.174424 kubelet[2027]: E1213 14:24:08.174359 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vvpdj" Dec 13 14:24:08.174424 kubelet[2027]: E1213 14:24:08.174278 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" Dec 13 14:24:08.174607 kubelet[2027]: E1213 14:24:08.174422 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" Dec 13 14:24:08.174607 kubelet[2027]: E1213 14:24:08.174515 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-vvpdj_kube-system(b06d3a28-6e3f-4f05-93f2-51de207fe5d1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-vvpdj_kube-system(b06d3a28-6e3f-4f05-93f2-51de207fe5d1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vvpdj" podUID="b06d3a28-6e3f-4f05-93f2-51de207fe5d1" Dec 13 14:24:08.174778 kubelet[2027]: E1213 14:24:08.174622 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-768cdbc847-lf68x_calico-apiserver(f5155243-e16e-49bf-95ae-9a9cc29afed5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-768cdbc847-lf68x_calico-apiserver(f5155243-e16e-49bf-95ae-9a9cc29afed5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" podUID="f5155243-e16e-49bf-95ae-9a9cc29afed5" Dec 13 14:24:08.174994 env[1220]: time="2024-12-13T14:24:08.174948080Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-fl59n,Uid:eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.176920 kubelet[2027]: E1213 14:24:08.176878 2027 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:08.177054 kubelet[2027]: E1213 14:24:08.176940 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" Dec 13 14:24:08.177054 kubelet[2027]: E1213 14:24:08.176968 2027 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" Dec 13 14:24:08.177223 kubelet[2027]: E1213 14:24:08.177040 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-768cdbc847-fl59n_calico-apiserver(eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-768cdbc847-fl59n_calico-apiserver(eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" podUID="eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe" Dec 13 14:24:08.702250 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71-shm.mount: Deactivated successfully. Dec 13 14:24:08.702410 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69-shm.mount: Deactivated successfully. Dec 13 14:24:08.702510 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b-shm.mount: Deactivated successfully. Dec 13 14:24:08.702607 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba-shm.mount: Deactivated successfully. Dec 13 14:24:08.702712 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2-shm.mount: Deactivated successfully. Dec 13 14:24:08.988835 kubelet[2027]: I1213 14:24:08.984110 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:08.991657 env[1220]: time="2024-12-13T14:24:08.991608203Z" level=info msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" Dec 13 14:24:09.000619 kubelet[2027]: I1213 14:24:08.997566 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:09.001437 env[1220]: time="2024-12-13T14:24:09.001392491Z" level=info msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" Dec 13 14:24:09.006094 kubelet[2027]: I1213 14:24:09.006052 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:09.009514 env[1220]: time="2024-12-13T14:24:09.007428017Z" level=info msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" Dec 13 14:24:09.016734 kubelet[2027]: I1213 14:24:09.016701 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:09.019509 env[1220]: time="2024-12-13T14:24:09.017571474Z" level=info msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" Dec 13 14:24:09.021504 kubelet[2027]: I1213 14:24:09.021453 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:09.022191 env[1220]: time="2024-12-13T14:24:09.022136302Z" level=info msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" Dec 13 14:24:09.028278 kubelet[2027]: I1213 14:24:09.024371 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:09.036243 env[1220]: time="2024-12-13T14:24:09.036193633Z" level=info msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" Dec 13 14:24:09.161448 env[1220]: time="2024-12-13T14:24:09.161373821Z" level=error msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" failed" error="failed to destroy network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.162357 kubelet[2027]: E1213 14:24:09.161999 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:09.162357 kubelet[2027]: E1213 14:24:09.162099 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05"} Dec 13 14:24:09.162357 kubelet[2027]: E1213 14:24:09.162199 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bda9bb98-0423-4678-b9df-cc75250bd3e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.162357 kubelet[2027]: E1213 14:24:09.162255 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bda9bb98-0423-4678-b9df-cc75250bd3e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7hcsm" podUID="bda9bb98-0423-4678-b9df-cc75250bd3e5" Dec 13 14:24:09.164974 env[1220]: time="2024-12-13T14:24:09.164906648Z" level=error msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" failed" error="failed to destroy network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.165734 kubelet[2027]: E1213 14:24:09.165460 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:09.165734 kubelet[2027]: E1213 14:24:09.165539 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2"} Dec 13 14:24:09.165734 kubelet[2027]: E1213 14:24:09.165615 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b06d3a28-6e3f-4f05-93f2-51de207fe5d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.165734 kubelet[2027]: E1213 14:24:09.165651 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b06d3a28-6e3f-4f05-93f2-51de207fe5d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vvpdj" podUID="b06d3a28-6e3f-4f05-93f2-51de207fe5d1" Dec 13 14:24:09.247927 env[1220]: time="2024-12-13T14:24:09.246083131Z" level=error msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" failed" error="failed to destroy network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.248765 kubelet[2027]: E1213 14:24:09.248482 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:09.248765 kubelet[2027]: E1213 14:24:09.248571 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba"} Dec 13 14:24:09.248765 kubelet[2027]: E1213 14:24:09.248655 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.248765 kubelet[2027]: E1213 14:24:09.248718 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-8kt96" podUID="7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4" Dec 13 14:24:09.275736 env[1220]: time="2024-12-13T14:24:09.275653911Z" level=error msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" failed" error="failed to destroy network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.276700 kubelet[2027]: E1213 14:24:09.276376 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:09.276700 kubelet[2027]: E1213 14:24:09.276504 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69"} Dec 13 14:24:09.276700 kubelet[2027]: E1213 14:24:09.276581 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.276700 kubelet[2027]: E1213 14:24:09.276617 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" podUID="eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe" Dec 13 14:24:09.293244 env[1220]: time="2024-12-13T14:24:09.293171200Z" level=error msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" failed" error="failed to destroy network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.294181 kubelet[2027]: E1213 14:24:09.293842 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:09.294181 kubelet[2027]: E1213 14:24:09.293931 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71"} Dec 13 14:24:09.294181 kubelet[2027]: E1213 14:24:09.294011 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5155243-e16e-49bf-95ae-9a9cc29afed5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.294181 kubelet[2027]: E1213 14:24:09.294112 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5155243-e16e-49bf-95ae-9a9cc29afed5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" podUID="f5155243-e16e-49bf-95ae-9a9cc29afed5" Dec 13 14:24:09.302587 env[1220]: time="2024-12-13T14:24:09.302519707Z" level=error msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" failed" error="failed to destroy network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:24:09.303276 kubelet[2027]: E1213 14:24:09.303031 2027 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:09.303276 kubelet[2027]: E1213 14:24:09.303114 2027 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b"} Dec 13 14:24:09.303276 kubelet[2027]: E1213 14:24:09.303180 2027 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fbe07029-5ff3-460c-9ac9-3105743263ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:24:09.303276 kubelet[2027]: E1213 14:24:09.303223 2027 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fbe07029-5ff3-460c-9ac9-3105743263ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" podUID="fbe07029-5ff3-460c-9ac9-3105743263ff" Dec 13 14:24:15.275548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2931813269.mount: Deactivated successfully. Dec 13 14:24:15.319677 env[1220]: time="2024-12-13T14:24:15.319609476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.322392 env[1220]: time="2024-12-13T14:24:15.322348620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.327916 env[1220]: time="2024-12-13T14:24:15.327862974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.333216 env[1220]: time="2024-12-13T14:24:15.333164035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:24:15.333920 env[1220]: time="2024-12-13T14:24:15.333864684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:15.361274 env[1220]: time="2024-12-13T14:24:15.361206526Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:24:15.384843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4000977543.mount: Deactivated successfully. Dec 13 14:24:15.391424 env[1220]: time="2024-12-13T14:24:15.391366478Z" level=info msg="CreateContainer within sandbox \"3f6894ef99c37426eb5b900a2ece57fe7e16e3903cb10ac59d161688a38eaeb3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e\"" Dec 13 14:24:15.394045 env[1220]: time="2024-12-13T14:24:15.394014810Z" level=info msg="StartContainer for \"4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e\"" Dec 13 14:24:15.420110 systemd[1]: Started cri-containerd-4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e.scope. Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.456482 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:24:15.456830 kernel: audit: type=1400 audit(1734099855.450:982): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f63fd5457d8 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.510342 kernel: audit: type=1300 audit(1734099855.450:982): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f63fd5457d8 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.541050 kernel: audit: type=1327 audit(1734099855.450:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.541196 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.585938 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.586065 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.627262 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.650449 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.692426 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.692591 kernel: audit: type=1400 audit(1734099855.450:983): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.450000 audit: BPF prog-id=136 op=LOAD Dec 13 14:24:15.450000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e7dc8 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.477000 audit: BPF prog-id=137 op=LOAD Dec 13 14:24:15.477000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000e7e18 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.510000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:24:15.510000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c0001bdc30 a2=78 a3=c0000e7ea8 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:15.510000 audit: BPF prog-id=138 op=LOAD Dec 13 14:24:15.510000 audit[3160]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000e7ea8 items=0 ppid=2576 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:15.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466386465366166313334343535636635396437643038313839653333 Dec 13 14:24:15.695510 env[1220]: time="2024-12-13T14:24:15.695446333Z" level=info msg="StartContainer for \"4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e\" returns successfully" Dec 13 14:24:15.765670 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:24:15.765840 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:24:16.115556 kubelet[2027]: I1213 14:24:16.115002 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mjx85" podStartSLOduration=3.1794128600000002 podStartE2EDuration="21.114957368s" podCreationTimestamp="2024-12-13 14:23:55 +0000 UTC" firstStartedPulling="2024-12-13 14:23:57.400199512 +0000 UTC m=+13.759669810" lastFinishedPulling="2024-12-13 14:24:15.33574404 +0000 UTC m=+31.695214318" observedRunningTime="2024-12-13 14:24:16.113347519 +0000 UTC m=+32.472817827" watchObservedRunningTime="2024-12-13 14:24:16.114957368 +0000 UTC m=+32.474427672" Dec 13 14:24:17.075702 systemd[1]: run-containerd-runc-k8s.io-4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e-runc.u64sM7.mount: Deactivated successfully. Dec 13 14:24:17.286000 audit[3298]: AVC avc: denied { write } for pid=3298 comm="tee" name="fd" dev="proc" ino=24027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.286000 audit[3298]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe511409c4 a2=241 a3=1b6 items=1 ppid=3275 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.286000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:24:17.286000 audit: PATH item=0 name="/dev/fd/63" inode=24650 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.288000 audit[3296]: AVC avc: denied { write } for pid=3296 comm="tee" name="fd" dev="proc" ino=24031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.288000 audit[3296]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcba2ee9c4 a2=241 a3=1b6 items=1 ppid=3280 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.286000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.288000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:24:17.288000 audit: PATH item=0 name="/dev/fd/63" inode=24647 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.303000 audit[3318]: AVC avc: denied { write } for pid=3318 comm="tee" name="fd" dev="proc" ino=24667 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.303000 audit[3318]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe604579b5 a2=241 a3=1b6 items=1 ppid=3283 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.303000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:24:17.303000 audit: PATH item=0 name="/dev/fd/63" inode=24039 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.306000 audit[3321]: AVC avc: denied { write } for pid=3321 comm="tee" name="fd" dev="proc" ino=24671 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.306000 audit[3321]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff24e9d9b4 a2=241 a3=1b6 items=1 ppid=3273 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.306000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:24:17.306000 audit: PATH item=0 name="/dev/fd/63" inode=24044 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.306000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.312000 audit[3324]: AVC avc: denied { write } for pid=3324 comm="tee" name="fd" dev="proc" ino=24677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.312000 audit[3324]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf85ba9c4 a2=241 a3=1b6 items=1 ppid=3270 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.312000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:24:17.312000 audit: PATH item=0 name="/dev/fd/63" inode=24045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.312000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.322000 audit[3313]: AVC avc: denied { write } for pid=3313 comm="tee" name="fd" dev="proc" ino=24681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.322000 audit[3313]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffc5809c6 a2=241 a3=1b6 items=1 ppid=3271 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.322000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:24:17.322000 audit: PATH item=0 name="/dev/fd/63" inode=24659 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.322000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.328000 audit[3316]: AVC avc: denied { write } for pid=3316 comm="tee" name="fd" dev="proc" ino=24050 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:24:17.328000 audit[3316]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9ebed9c5 a2=241 a3=1b6 items=1 ppid=3282 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.328000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:24:17.328000 audit: PATH item=0 name="/dev/fd/63" inode=24662 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:17.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.569000 audit: BPF prog-id=139 op=LOAD Dec 13 14:24:17.569000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc1ee54bc0 a2=98 a3=3 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.569000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.570000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.571000 audit: BPF prog-id=140 op=LOAD Dec 13 14:24:17.571000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc1ee549a0 a2=74 a3=540051 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.571000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.572000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.572000 audit: BPF prog-id=141 op=LOAD Dec 13 14:24:17.572000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc1ee549d0 a2=94 a3=2 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.572000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.574000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.789000 audit: BPF prog-id=142 op=LOAD Dec 13 14:24:17.789000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc1ee54890 a2=40 a3=1 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.790000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:24:17.790000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.790000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc1ee54960 a2=50 a3=7ffc1ee54a40 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.790000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.801000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.801000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee548a0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.801000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1ee548d0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1ee547e0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee548f0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee548d0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee548c0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee548f0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1ee548d0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1ee548f0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc1ee548c0 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1ee54930 a2=28 a3=0 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc1ee546e0 a2=50 a3=1 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit: BPF prog-id=143 op=LOAD Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc1ee546e0 a2=94 a3=5 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc1ee54790 a2=50 a3=1 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc1ee548b0 a2=4 a3=38 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.802000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:17.802000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc1ee54900 a2=94 a3=6 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.802000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { confidentiality } for pid=3361 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:17.803000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc1ee540b0 a2=94 a3=83 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.803000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.803000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc1ee540b0 a2=94 a3=83 items=0 ppid=3281 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.803000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit: BPF prog-id=144 op=LOAD Dec 13 14:24:17.815000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc54d7e110 a2=98 a3=1999999999999999 items=0 ppid=3281 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:17.815000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit: BPF prog-id=145 op=LOAD Dec 13 14:24:17.815000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc54d7dff0 a2=74 a3=ffff items=0 ppid=3281 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:17.815000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.815000 audit: BPF prog-id=146 op=LOAD Dec 13 14:24:17.815000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc54d7e030 a2=40 a3=7ffc54d7e210 items=0 ppid=3281 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.815000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:24:17.816000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:24:17.915720 systemd-networkd[1024]: vxlan.calico: Link UP Dec 13 14:24:17.915735 systemd-networkd[1024]: vxlan.calico: Gained carrier Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit: BPF prog-id=147 op=LOAD Dec 13 14:24:17.953000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff78b2b2d0 a2=98 a3=ffffffff items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.953000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.953000 audit: BPF prog-id=148 op=LOAD Dec 13 14:24:17.953000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff78b2b0e0 a2=74 a3=540051 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit: BPF prog-id=149 op=LOAD Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff78b2b110 a2=94 a3=2 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2afe0 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff78b2b010 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff78b2af20 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2b030 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2b010 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2b000 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.954000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.954000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2b030 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.955000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.955000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff78b2b010 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.955000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.955000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff78b2b030 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.955000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.955000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff78b2b000 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.955000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.955000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff78b2b070 a2=28 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.955000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit: BPF prog-id=150 op=LOAD Dec 13 14:24:17.956000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff78b2aee0 a2=40 a3=0 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.956000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:24:17.956000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.956000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff78b2aed0 a2=50 a3=2800 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.956000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff78b2aed0 a2=50 a3=2800 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.960000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit: BPF prog-id=151 op=LOAD Dec 13 14:24:17.960000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff78b2a6f0 a2=94 a3=2 items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.960000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.960000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.960000 audit: BPF prog-id=152 op=LOAD Dec 13 14:24:17.960000 audit[3410]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff78b2a7f0 a2=94 a3=2d items=0 ppid=3281 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.960000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.989000 audit: BPF prog-id=153 op=LOAD Dec 13 14:24:17.989000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6fcd0b10 a2=98 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:17.990000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit: BPF prog-id=154 op=LOAD Dec 13 14:24:17.991000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fcd08f0 a2=74 a3=540051 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:17.991000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:17.991000 audit: BPF prog-id=155 op=LOAD Dec 13 14:24:17.991000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fcd0920 a2=94 a3=2 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:17.991000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:17.991000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit: BPF prog-id=156 op=LOAD Dec 13 14:24:18.122000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fcd07e0 a2=40 a3=1 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.122000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.122000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:24:18.122000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.122000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6fcd08b0 a2=50 a3=7ffd6fcd0990 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.122000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.140000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.140000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd07f0 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.141000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.141000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fcd0820 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.141000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.141000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.141000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fcd0730 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.141000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.142000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.142000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd0840 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.142000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.142000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd0820 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.142000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.142000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd0810 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd0840 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fcd0820 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fcd0840 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fcd0810 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fcd0880 a2=28 a3=0 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6fcd0630 a2=50 a3=1 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit: BPF prog-id=157 op=LOAD Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6fcd0630 a2=94 a3=5 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6fcd06e0 a2=50 a3=1 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6fcd0800 a2=4 a3=38 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.143000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:18.143000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fcd0850 a2=94 a3=6 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.143000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:18.144000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fcd0000 a2=94 a3=83 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.144000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { perfmon } for pid=3415 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.144000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:24:18.144000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fcd0000 a2=94 a3=83 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.144000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.145000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.145000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fcd1a40 a2=10 a3=f1f00800 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.145000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.145000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fcd18e0 a2=10 a3=3 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.145000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.145000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fcd1880 a2=10 a3=3 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.145000 audit[3415]: AVC avc: denied { bpf } for pid=3415 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:18.145000 audit[3415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fcd1880 a2=10 a3=7 items=0 ppid=3281 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:24:18.155000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:24:18.155000 audit[1011]: SYSCALL arch=c000003e syscall=232 success=yes exit=1 a0=a a1=5609b7cd7cd0 a2=46 a3=ffffffff items=0 ppid=1 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-udevd" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.155000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-udevd" Dec 13 14:24:18.243000 audit[3437]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:18.243000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcb5b35110 a2=0 a3=7ffcb5b350fc items=0 ppid=3281 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.243000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:18.253000 audit[3438]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:18.253000 audit[3438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc0d5b6b20 a2=0 a3=7ffc0d5b6b0c items=0 ppid=3281 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:18.263000 audit[3440]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:18.263000 audit[3440]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc3da49ba0 a2=0 a3=7ffc3da49b8c items=0 ppid=3281 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.263000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:18.269000 audit[3439]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:18.269000 audit[3439]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff3f482280 a2=0 a3=7fff3f48226c items=0 ppid=3281 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:18.269000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:19.679559 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Dec 13 14:24:19.849078 env[1220]: time="2024-12-13T14:24:19.849029053Z" level=info msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.909 [INFO][3471] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.909 [INFO][3471] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" iface="eth0" netns="/var/run/netns/cni-4045164b-c616-4bfa-5257-c9ed4cfac9b8" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.910 [INFO][3471] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" iface="eth0" netns="/var/run/netns/cni-4045164b-c616-4bfa-5257-c9ed4cfac9b8" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.910 [INFO][3471] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" iface="eth0" netns="/var/run/netns/cni-4045164b-c616-4bfa-5257-c9ed4cfac9b8" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.910 [INFO][3471] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.910 [INFO][3471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.937 [INFO][3477] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.937 [INFO][3477] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.938 [INFO][3477] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.947 [WARNING][3477] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.948 [INFO][3477] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.951 [INFO][3477] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:19.960101 env[1220]: 2024-12-13 14:24:19.954 [INFO][3471] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:19.960121 systemd[1]: run-netns-cni\x2d4045164b\x2dc616\x2d4bfa\x2d5257\x2dc9ed4cfac9b8.mount: Deactivated successfully. Dec 13 14:24:19.962162 env[1220]: time="2024-12-13T14:24:19.962095371Z" level=info msg="TearDown network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" successfully" Dec 13 14:24:19.962162 env[1220]: time="2024-12-13T14:24:19.962145155Z" level=info msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" returns successfully" Dec 13 14:24:19.963208 env[1220]: time="2024-12-13T14:24:19.963150164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-94d48fcdf-2qzfk,Uid:fbe07029-5ff3-460c-9ac9-3105743263ff,Namespace:calico-system,Attempt:1,}" Dec 13 14:24:20.132508 systemd-networkd[1024]: cali82bf1fb0392: Link UP Dec 13 14:24:20.140340 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:20.149844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82bf1fb0392: link becomes ready Dec 13 14:24:20.149378 systemd-networkd[1024]: cali82bf1fb0392: Gained carrier Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.038 [INFO][3484] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0 calico-kube-controllers-94d48fcdf- calico-system fbe07029-5ff3-460c-9ac9-3105743263ff 770 0 2024-12-13 14:23:55 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:94d48fcdf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal calico-kube-controllers-94d48fcdf-2qzfk eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali82bf1fb0392 [] []}} ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.038 [INFO][3484] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.077 [INFO][3496] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" HandleID="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.089 [INFO][3496] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" HandleID="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed000), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"calico-kube-controllers-94d48fcdf-2qzfk", "timestamp":"2024-12-13 14:24:20.077819277 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.089 [INFO][3496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.089 [INFO][3496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.089 [INFO][3496] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.091 [INFO][3496] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.097 [INFO][3496] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.102 [INFO][3496] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.104 [INFO][3496] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.107 [INFO][3496] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.107 [INFO][3496] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.109 [INFO][3496] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.115 [INFO][3496] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.126 [INFO][3496] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.1/26] block=192.168.101.0/26 handle="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.126 [INFO][3496] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.1/26] handle="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.126 [INFO][3496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:20.176696 env[1220]: 2024-12-13 14:24:20.126 [INFO][3496] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.1/26] IPv6=[] ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" HandleID="k8s-pod-network.aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.129 [INFO][3484] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0", GenerateName:"calico-kube-controllers-94d48fcdf-", Namespace:"calico-system", SelfLink:"", UID:"fbe07029-5ff3-460c-9ac9-3105743263ff", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"94d48fcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-94d48fcdf-2qzfk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82bf1fb0392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.129 [INFO][3484] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.1/32] ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.129 [INFO][3484] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali82bf1fb0392 ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.149 [INFO][3484] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.149 [INFO][3484] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0", GenerateName:"calico-kube-controllers-94d48fcdf-", Namespace:"calico-system", SelfLink:"", UID:"fbe07029-5ff3-460c-9ac9-3105743263ff", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"94d48fcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c", Pod:"calico-kube-controllers-94d48fcdf-2qzfk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82bf1fb0392", MAC:"ce:96:8d:da:d5:55", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:20.177980 env[1220]: 2024-12-13 14:24:20.174 [INFO][3484] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c" Namespace="calico-system" Pod="calico-kube-controllers-94d48fcdf-2qzfk" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:20.203973 env[1220]: time="2024-12-13T14:24:20.203762320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:20.203973 env[1220]: time="2024-12-13T14:24:20.203821914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:20.204355 env[1220]: time="2024-12-13T14:24:20.204277061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:20.204832 env[1220]: time="2024-12-13T14:24:20.204712461Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c pid=3524 runtime=io.containerd.runc.v2 Dec 13 14:24:20.214000 audit[3521]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3521 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:20.214000 audit[3521]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff06b98b50 a2=0 a3=7fff06b98b3c items=0 ppid=3281 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.214000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:20.246577 systemd[1]: Started cri-containerd-aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c.scope. Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.264000 audit: BPF prog-id=158 op=LOAD Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3524 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393138393534346362386163323261316264346431616461313465 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3524 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393138393534346362386163323261316264346431616461313465 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit: BPF prog-id=159 op=LOAD Dec 13 14:24:20.265000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029bd70 items=0 ppid=3524 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393138393534346362386163323261316264346431616461313465 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit: BPF prog-id=160 op=LOAD Dec 13 14:24:20.265000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029bdb8 items=0 ppid=3524 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393138393534346362386163323261316264346431616461313465 Dec 13 14:24:20.265000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:24:20.265000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { perfmon } for pid=3533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit[3533]: AVC avc: denied { bpf } for pid=3533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:20.265000 audit: BPF prog-id=161 op=LOAD Dec 13 14:24:20.265000 audit[3533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003041c8 items=0 ppid=3524 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393138393534346362386163323261316264346431616461313465 Dec 13 14:24:20.308235 env[1220]: time="2024-12-13T14:24:20.307651940Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-94d48fcdf-2qzfk,Uid:fbe07029-5ff3-460c-9ac9-3105743263ff,Namespace:calico-system,Attempt:1,} returns sandbox id \"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c\"" Dec 13 14:24:20.310433 env[1220]: time="2024-12-13T14:24:20.310393150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:24:20.847088 env[1220]: time="2024-12-13T14:24:20.846854495Z" level=info msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.906 [INFO][3572] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.906 [INFO][3572] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" iface="eth0" netns="/var/run/netns/cni-14afc5c4-c30c-8ada-8a58-5468e6769994" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.906 [INFO][3572] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" iface="eth0" netns="/var/run/netns/cni-14afc5c4-c30c-8ada-8a58-5468e6769994" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.907 [INFO][3572] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" iface="eth0" netns="/var/run/netns/cni-14afc5c4-c30c-8ada-8a58-5468e6769994" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.907 [INFO][3572] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.907 [INFO][3572] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.938 [INFO][3578] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.938 [INFO][3578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.938 [INFO][3578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.947 [WARNING][3578] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.947 [INFO][3578] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.950 [INFO][3578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:20.953928 env[1220]: 2024-12-13 14:24:20.952 [INFO][3572] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:20.955790 env[1220]: time="2024-12-13T14:24:20.954156882Z" level=info msg="TearDown network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" successfully" Dec 13 14:24:20.955790 env[1220]: time="2024-12-13T14:24:20.954202471Z" level=info msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" returns successfully" Dec 13 14:24:20.955790 env[1220]: time="2024-12-13T14:24:20.955105168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vvpdj,Uid:b06d3a28-6e3f-4f05-93f2-51de207fe5d1,Namespace:kube-system,Attempt:1,}" Dec 13 14:24:20.963172 systemd[1]: run-netns-cni\x2d14afc5c4\x2dc30c\x2d8ada\x2d8a58\x2d5468e6769994.mount: Deactivated successfully. Dec 13 14:24:21.163243 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:21.155908 systemd-networkd[1024]: cali387f1de6e0e: Link UP Dec 13 14:24:21.173456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali387f1de6e0e: link becomes ready Dec 13 14:24:21.174993 systemd-networkd[1024]: cali387f1de6e0e: Gained carrier Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.040 [INFO][3584] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0 coredns-6f6b679f8f- kube-system b06d3a28-6e3f-4f05-93f2-51de207fe5d1 778 0 2024-12-13 14:23:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal coredns-6f6b679f8f-vvpdj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali387f1de6e0e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.040 [INFO][3584] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.087 [INFO][3596] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" HandleID="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.101 [INFO][3596] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" HandleID="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b650), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-vvpdj", "timestamp":"2024-12-13 14:24:21.087175041 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.101 [INFO][3596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.101 [INFO][3596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.101 [INFO][3596] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.104 [INFO][3596] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.111 [INFO][3596] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.117 [INFO][3596] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.120 [INFO][3596] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.124 [INFO][3596] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.124 [INFO][3596] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.126 [INFO][3596] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.132 [INFO][3596] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.146 [INFO][3596] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.2/26] block=192.168.101.0/26 handle="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.146 [INFO][3596] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.2/26] handle="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.146 [INFO][3596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:21.204477 env[1220]: 2024-12-13 14:24:21.146 [INFO][3596] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.2/26] IPv6=[] ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" HandleID="k8s-pod-network.ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.148 [INFO][3584] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b06d3a28-6e3f-4f05-93f2-51de207fe5d1", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-vvpdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali387f1de6e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.148 [INFO][3584] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.2/32] ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.148 [INFO][3584] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali387f1de6e0e ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.176 [INFO][3584] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.176 [INFO][3584] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b06d3a28-6e3f-4f05-93f2-51de207fe5d1", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec", Pod:"coredns-6f6b679f8f-vvpdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali387f1de6e0e", MAC:"9a:78:c9:6e:4c:19", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:21.205713 env[1220]: 2024-12-13 14:24:21.196 [INFO][3584] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec" Namespace="kube-system" Pod="coredns-6f6b679f8f-vvpdj" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:21.261551 kernel: kauditd_printk_skb: 627 callbacks suppressed Dec 13 14:24:21.261705 kernel: audit: type=1325 audit(1734099861.237:1110): table=filter:102 family=2 entries=38 op=nft_register_chain pid=3616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:21.237000 audit[3616]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3616 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:21.270072 env[1220]: time="2024-12-13T14:24:21.269991031Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:21.270325 env[1220]: time="2024-12-13T14:24:21.270049697Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:21.270468 env[1220]: time="2024-12-13T14:24:21.270424289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:21.270789 env[1220]: time="2024-12-13T14:24:21.270721757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec pid=3625 runtime=io.containerd.runc.v2 Dec 13 14:24:21.237000 audit[3616]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff31758830 a2=0 a3=7fff3175881c items=0 ppid=3281 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.312441 kernel: audit: type=1300 audit(1734099861.237:1110): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff31758830 a2=0 a3=7fff3175881c items=0 ppid=3281 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:21.332337 kernel: audit: type=1327 audit(1734099861.237:1110): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:21.354376 systemd[1]: Started cri-containerd-ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec.scope. Dec 13 14:24:21.375932 systemd[1]: run-containerd-runc-k8s.io-ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec-runc.vRzfQw.mount: Deactivated successfully. Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.433918 kernel: audit: type=1400 audit(1734099861.408:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.467392 kernel: audit: type=1400 audit(1734099861.408:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.493473 env[1220]: time="2024-12-13T14:24:21.493417239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vvpdj,Uid:b06d3a28-6e3f-4f05-93f2-51de207fe5d1,Namespace:kube-system,Attempt:1,} returns sandbox id \"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec\"" Dec 13 14:24:21.498554 kernel: audit: type=1400 audit(1734099861.408:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.500007 env[1220]: time="2024-12-13T14:24:21.499967232Z" level=info msg="CreateContainer within sandbox \"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.523401 kernel: audit: type=1400 audit(1734099861.408:1114): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.523508 kernel: audit: type=1400 audit(1734099861.408:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.586070 kernel: audit: type=1400 audit(1734099861.408:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.586205 kernel: audit: type=1400 audit(1734099861.408:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.429000 audit: BPF prog-id=162 op=LOAD Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3625 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643261653138373363396134643036353235636466633339373531 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3625 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643261653138373363396134643036353235636466633339373531 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit: BPF prog-id=163 op=LOAD Dec 13 14:24:21.430000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8260 items=0 ppid=3625 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643261653138373363396134643036353235636466633339373531 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.430000 audit: BPF prog-id=164 op=LOAD Dec 13 14:24:21.430000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c82a8 items=0 ppid=3625 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643261653138373363396134643036353235636466633339373531 Dec 13 14:24:21.430000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:24:21.430000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.431000 audit: BPF prog-id=165 op=LOAD Dec 13 14:24:21.431000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c86b8 items=0 ppid=3625 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465643261653138373363396134643036353235636466633339373531 Dec 13 14:24:21.666252 env[1220]: time="2024-12-13T14:24:21.666189125Z" level=info msg="CreateContainer within sandbox \"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"993caeb2e93ef6e9f1653164bc8eaeea843deb4f3f3d893d9cdc6ff5855716fa\"" Dec 13 14:24:21.670106 env[1220]: time="2024-12-13T14:24:21.670059446Z" level=info msg="StartContainer for \"993caeb2e93ef6e9f1653164bc8eaeea843deb4f3f3d893d9cdc6ff5855716fa\"" Dec 13 14:24:21.705553 systemd[1]: Started cri-containerd-993caeb2e93ef6e9f1653164bc8eaeea843deb4f3f3d893d9cdc6ff5855716fa.scope. Dec 13 14:24:21.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.737000 audit: BPF prog-id=166 op=LOAD Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3625 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939336361656232653933656636653966313635333136346263386561 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3625 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939336361656232653933656636653966313635333136346263386561 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit: BPF prog-id=167 op=LOAD Dec 13 14:24:21.738000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fe000 items=0 ppid=3625 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939336361656232653933656636653966313635333136346263386561 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit: BPF prog-id=168 op=LOAD Dec 13 14:24:21.738000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fe048 items=0 ppid=3625 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939336361656232653933656636653966313635333136346263386561 Dec 13 14:24:21.738000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:24:21.738000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { perfmon } for pid=3667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit[3667]: AVC avc: denied { bpf } for pid=3667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:21.738000 audit: BPF prog-id=169 op=LOAD Dec 13 14:24:21.738000 audit[3667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fe458 items=0 ppid=3625 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939336361656232653933656636653966313635333136346263386561 Dec 13 14:24:21.769467 env[1220]: time="2024-12-13T14:24:21.769391465Z" level=info msg="StartContainer for \"993caeb2e93ef6e9f1653164bc8eaeea843deb4f3f3d893d9cdc6ff5855716fa\" returns successfully" Dec 13 14:24:21.853347 env[1220]: time="2024-12-13T14:24:21.853273949Z" level=info msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.992 [INFO][3712] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.992 [INFO][3712] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" iface="eth0" netns="/var/run/netns/cni-82e164ce-19d5-3fbb-d85f-b77b738dffb0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.993 [INFO][3712] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" iface="eth0" netns="/var/run/netns/cni-82e164ce-19d5-3fbb-d85f-b77b738dffb0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.993 [INFO][3712] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" iface="eth0" netns="/var/run/netns/cni-82e164ce-19d5-3fbb-d85f-b77b738dffb0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.993 [INFO][3712] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:21.993 [INFO][3712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.042 [INFO][3718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.042 [INFO][3718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.043 [INFO][3718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.056 [WARNING][3718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.057 [INFO][3718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.063 [INFO][3718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:22.081962 env[1220]: 2024-12-13 14:24:22.067 [INFO][3712] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:22.091862 systemd[1]: run-netns-cni\x2d82e164ce\x2d19d5\x2d3fbb\x2dd85f\x2db77b738dffb0.mount: Deactivated successfully. Dec 13 14:24:22.098184 kubelet[2027]: I1213 14:24:22.096677 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-vvpdj" podStartSLOduration=34.096649228 podStartE2EDuration="34.096649228s" podCreationTimestamp="2024-12-13 14:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:24:22.095737589 +0000 UTC m=+38.455207891" watchObservedRunningTime="2024-12-13 14:24:22.096649228 +0000 UTC m=+38.456119529" Dec 13 14:24:22.098837 env[1220]: time="2024-12-13T14:24:22.098778095Z" level=info msg="TearDown network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" successfully" Dec 13 14:24:22.103318 env[1220]: time="2024-12-13T14:24:22.099052236Z" level=info msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" returns successfully" Dec 13 14:24:22.105024 env[1220]: time="2024-12-13T14:24:22.104984534Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7hcsm,Uid:bda9bb98-0423-4678-b9df-cc75250bd3e5,Namespace:calico-system,Attempt:1,}" Dec 13 14:24:22.179676 systemd-networkd[1024]: cali82bf1fb0392: Gained IPv6LL Dec 13 14:24:22.192000 audit[3735]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:22.192000 audit[3735]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdae860360 a2=0 a3=7ffdae86034c items=0 ppid=2166 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:22.203000 audit[3735]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:22.203000 audit[3735]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdae860360 a2=0 a3=0 items=0 ppid=2166 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:22.229000 audit[3737]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:22.229000 audit[3737]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe5fc05980 a2=0 a3=7ffe5fc0596c items=0 ppid=2166 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:22.237000 audit[3737]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:22.237000 audit[3737]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe5fc05980 a2=0 a3=7ffe5fc0596c items=0 ppid=2166 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.237000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:22.373412 systemd-networkd[1024]: calic6fe4571030: Link UP Dec 13 14:24:22.393564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:22.393787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic6fe4571030: link becomes ready Dec 13 14:24:22.398788 systemd-networkd[1024]: calic6fe4571030: Gained carrier Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.247 [INFO][3724] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0 csi-node-driver- calico-system bda9bb98-0423-4678-b9df-cc75250bd3e5 788 0 2024-12-13 14:23:55 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal csi-node-driver-7hcsm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic6fe4571030 [] []}} ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.247 [INFO][3724] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.306 [INFO][3740] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" HandleID="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.323 [INFO][3740] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" HandleID="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310960), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"csi-node-driver-7hcsm", "timestamp":"2024-12-13 14:24:22.306366731 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.323 [INFO][3740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.324 [INFO][3740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.324 [INFO][3740] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.327 [INFO][3740] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.333 [INFO][3740] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.340 [INFO][3740] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.343 [INFO][3740] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.347 [INFO][3740] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.347 [INFO][3740] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.349 [INFO][3740] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.356 [INFO][3740] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.368 [INFO][3740] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.3/26] block=192.168.101.0/26 handle="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.368 [INFO][3740] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.3/26] handle="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.368 [INFO][3740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:22.420321 env[1220]: 2024-12-13 14:24:22.368 [INFO][3740] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.3/26] IPv6=[] ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" HandleID="k8s-pod-network.4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.370 [INFO][3724] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bda9bb98-0423-4678-b9df-cc75250bd3e5", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-7hcsm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6fe4571030", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.370 [INFO][3724] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.3/32] ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.370 [INFO][3724] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic6fe4571030 ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.399 [INFO][3724] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.399 [INFO][3724] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bda9bb98-0423-4678-b9df-cc75250bd3e5", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d", Pod:"csi-node-driver-7hcsm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6fe4571030", MAC:"16:4c:0f:f2:92:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:22.421606 env[1220]: 2024-12-13 14:24:22.418 [INFO][3724] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d" Namespace="calico-system" Pod="csi-node-driver-7hcsm" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:22.453000 audit[3759]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:22.453000 audit[3759]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffc606ecaa0 a2=0 a3=7ffc606eca8c items=0 ppid=3281 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.453000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:22.475758 env[1220]: time="2024-12-13T14:24:22.475665168Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:22.476332 env[1220]: time="2024-12-13T14:24:22.476272953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:22.476542 env[1220]: time="2024-12-13T14:24:22.476507101Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:22.476857 env[1220]: time="2024-12-13T14:24:22.476819903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d pid=3769 runtime=io.containerd.runc.v2 Dec 13 14:24:22.526357 systemd[1]: Started cri-containerd-4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d.scope. Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit: BPF prog-id=170 op=LOAD Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353164306434643861363261323535313634346563313930623531 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353164306434643861363261323535313634346563313930623531 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit: BPF prog-id=171 op=LOAD Dec 13 14:24:22.545000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001df150 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353164306434643861363261323535313634346563313930623531 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.545000 audit: BPF prog-id=172 op=LOAD Dec 13 14:24:22.545000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001df198 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353164306434643861363261323535313634346563313930623531 Dec 13 14:24:22.546000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:24:22.546000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:22.546000 audit: BPF prog-id=173 op=LOAD Dec 13 14:24:22.546000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001df5a8 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:22.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463353164306434643861363261323535313634346563313930623531 Dec 13 14:24:22.575385 env[1220]: time="2024-12-13T14:24:22.575332879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7hcsm,Uid:bda9bb98-0423-4678-b9df-cc75250bd3e5,Namespace:calico-system,Attempt:1,} returns sandbox id \"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d\"" Dec 13 14:24:22.849637 env[1220]: time="2024-12-13T14:24:22.849578536Z" level=info msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" Dec 13 14:24:22.862437 env[1220]: time="2024-12-13T14:24:22.862355081Z" level=info msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" Dec 13 14:24:22.963891 systemd[1]: run-containerd-runc-k8s.io-4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d-runc.FbcuWu.mount: Deactivated successfully. Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.992 [INFO][3835] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.993 [INFO][3835] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" iface="eth0" netns="/var/run/netns/cni-e03aad32-805e-b53c-553d-01fadf2d386e" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.995 [INFO][3835] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" iface="eth0" netns="/var/run/netns/cni-e03aad32-805e-b53c-553d-01fadf2d386e" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.995 [INFO][3835] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" iface="eth0" netns="/var/run/netns/cni-e03aad32-805e-b53c-553d-01fadf2d386e" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.995 [INFO][3835] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:22.995 [INFO][3835] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.053 [INFO][3846] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.063 [INFO][3846] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.063 [INFO][3846] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.082 [WARNING][3846] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.082 [INFO][3846] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.084 [INFO][3846] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:23.088386 env[1220]: 2024-12-13 14:24:23.086 [INFO][3835] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:23.097155 systemd[1]: run-netns-cni\x2de03aad32\x2d805e\x2db53c\x2d553d\x2d01fadf2d386e.mount: Deactivated successfully. Dec 13 14:24:23.098627 env[1220]: time="2024-12-13T14:24:23.098441212Z" level=info msg="TearDown network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" successfully" Dec 13 14:24:23.098627 env[1220]: time="2024-12-13T14:24:23.098494739Z" level=info msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" returns successfully" Dec 13 14:24:23.099410 env[1220]: time="2024-12-13T14:24:23.099359736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-8kt96,Uid:7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4,Namespace:kube-system,Attempt:1,}" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.022 [INFO][3840] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.022 [INFO][3840] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" iface="eth0" netns="/var/run/netns/cni-cb20697e-c9f9-4643-92f7-d70b90abfc0a" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.023 [INFO][3840] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" iface="eth0" netns="/var/run/netns/cni-cb20697e-c9f9-4643-92f7-d70b90abfc0a" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.023 [INFO][3840] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" iface="eth0" netns="/var/run/netns/cni-cb20697e-c9f9-4643-92f7-d70b90abfc0a" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.023 [INFO][3840] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.023 [INFO][3840] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.156 [INFO][3854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.157 [INFO][3854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.157 [INFO][3854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.171 [WARNING][3854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.171 [INFO][3854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.173 [INFO][3854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:23.176531 env[1220]: 2024-12-13 14:24:23.174 [INFO][3840] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:23.188558 env[1220]: time="2024-12-13T14:24:23.176727026Z" level=info msg="TearDown network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" successfully" Dec 13 14:24:23.188558 env[1220]: time="2024-12-13T14:24:23.176771386Z" level=info msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" returns successfully" Dec 13 14:24:23.185924 systemd[1]: run-netns-cni\x2dcb20697e\x2dc9f9\x2d4643\x2d92f7\x2dd70b90abfc0a.mount: Deactivated successfully. Dec 13 14:24:23.190585 env[1220]: time="2024-12-13T14:24:23.190534502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-fl59n,Uid:eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:24:23.199746 systemd-networkd[1024]: cali387f1de6e0e: Gained IPv6LL Dec 13 14:24:23.453091 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:23.453229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f85ae21208: link becomes ready Dec 13 14:24:23.436927 systemd-networkd[1024]: cali8f85ae21208: Link UP Dec 13 14:24:23.461832 systemd-networkd[1024]: cali8f85ae21208: Gained carrier Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.235 [INFO][3860] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0 coredns-6f6b679f8f- kube-system 7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4 806 0 2024-12-13 14:23:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal coredns-6f6b679f8f-8kt96 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8f85ae21208 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.235 [INFO][3860] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.374 [INFO][3885] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" HandleID="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.387 [INFO][3885] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" HandleID="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003333c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"coredns-6f6b679f8f-8kt96", "timestamp":"2024-12-13 14:24:23.374683196 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.387 [INFO][3885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.387 [INFO][3885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.387 [INFO][3885] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.390 [INFO][3885] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.395 [INFO][3885] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.401 [INFO][3885] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.404 [INFO][3885] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.408 [INFO][3885] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.408 [INFO][3885] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.410 [INFO][3885] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.416 [INFO][3885] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.426 [INFO][3885] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.4/26] block=192.168.101.0/26 handle="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.426 [INFO][3885] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.4/26] handle="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.426 [INFO][3885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:23.487099 env[1220]: 2024-12-13 14:24:23.426 [INFO][3885] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.4/26] IPv6=[] ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" HandleID="k8s-pod-network.4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.428 [INFO][3860] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-6f6b679f8f-8kt96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f85ae21208", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.428 [INFO][3860] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.4/32] ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.428 [INFO][3860] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f85ae21208 ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.438 [INFO][3860] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.461 [INFO][3860] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d", Pod:"coredns-6f6b679f8f-8kt96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f85ae21208", MAC:"2e:ac:d7:23:a8:18", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:23.488350 env[1220]: 2024-12-13 14:24:23.485 [INFO][3860] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d" Namespace="kube-system" Pod="coredns-6f6b679f8f-8kt96" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:23.520399 systemd-networkd[1024]: calic6fe4571030: Gained IPv6LL Dec 13 14:24:23.535000 audit[3919]: NETFILTER_CFG table=filter:108 family=2 entries=44 op=nft_register_chain pid=3919 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:23.538371 env[1220]: time="2024-12-13T14:24:23.538308750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:23.535000 audit[3919]: SYSCALL arch=c000003e syscall=46 success=yes exit=22260 a0=3 a1=7ffdd1c3a3f0 a2=0 a3=7ffdd1c3a3dc items=0 ppid=3281 pid=3919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.535000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:23.543756 env[1220]: time="2024-12-13T14:24:23.543691213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:23.546336 env[1220]: time="2024-12-13T14:24:23.546251221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:23.550661 env[1220]: time="2024-12-13T14:24:23.550618305Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:23.551384 env[1220]: time="2024-12-13T14:24:23.551341676Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:24:23.566346 env[1220]: time="2024-12-13T14:24:23.559983009Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:23.566346 env[1220]: time="2024-12-13T14:24:23.560035923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:23.566346 env[1220]: time="2024-12-13T14:24:23.560054728Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:23.566346 env[1220]: time="2024-12-13T14:24:23.560252190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d pid=3927 runtime=io.containerd.runc.v2 Dec 13 14:24:23.566346 env[1220]: time="2024-12-13T14:24:23.565421322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:24:23.575648 env[1220]: time="2024-12-13T14:24:23.575605024Z" level=info msg="CreateContainer within sandbox \"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:24:23.588886 systemd-networkd[1024]: calic19779ff789: Link UP Dec 13 14:24:23.598991 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic19779ff789: link becomes ready Dec 13 14:24:23.600637 systemd-networkd[1024]: calic19779ff789: Gained carrier Dec 13 14:24:23.618790 env[1220]: time="2024-12-13T14:24:23.618724486Z" level=info msg="CreateContainer within sandbox \"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2\"" Dec 13 14:24:23.619701 env[1220]: time="2024-12-13T14:24:23.619657504Z" level=info msg="StartContainer for \"78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2\"" Dec 13 14:24:23.631620 systemd[1]: Started cri-containerd-4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d.scope. Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.357 [INFO][3874] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0 calico-apiserver-768cdbc847- calico-apiserver eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe 807 0 2024-12-13 14:23:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:768cdbc847 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal calico-apiserver-768cdbc847-fl59n eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic19779ff789 [] []}} ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.357 [INFO][3874] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.497 [INFO][3897] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" HandleID="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.517 [INFO][3897] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" HandleID="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310d70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"calico-apiserver-768cdbc847-fl59n", "timestamp":"2024-12-13 14:24:23.497451756 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.517 [INFO][3897] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.517 [INFO][3897] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.517 [INFO][3897] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.520 [INFO][3897] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.526 [INFO][3897] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.532 [INFO][3897] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.539 [INFO][3897] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.545 [INFO][3897] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.545 [INFO][3897] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.550 [INFO][3897] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719 Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.566 [INFO][3897] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.581 [INFO][3897] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.5/26] block=192.168.101.0/26 handle="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.581 [INFO][3897] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.5/26] handle="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.581 [INFO][3897] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:23.642981 env[1220]: 2024-12-13 14:24:23.581 [INFO][3897] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.5/26] IPv6=[] ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" HandleID="k8s-pod-network.dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.585 [INFO][3874] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-768cdbc847-fl59n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic19779ff789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.585 [INFO][3874] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.5/32] ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.585 [INFO][3874] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic19779ff789 ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.604 [INFO][3874] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.605 [INFO][3874] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719", Pod:"calico-apiserver-768cdbc847-fl59n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic19779ff789", MAC:"06:ae:42:de:ec:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:23.644178 env[1220]: 2024-12-13 14:24:23.625 [INFO][3874] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-fl59n" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:23.677625 systemd[1]: Started cri-containerd-78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2.scope. Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.682000 audit: BPF prog-id=174 op=LOAD Dec 13 14:24:23.683000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.683000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366163623630663162323836666665396432333364343732643262 Dec 13 14:24:23.683000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.683000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366163623630663162323836666665396432333364343732643262 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.684000 audit: BPF prog-id=175 op=LOAD Dec 13 14:24:23.684000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b040 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366163623630663162323836666665396432333364343732643262 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.685000 audit: BPF prog-id=176 op=LOAD Dec 13 14:24:23.685000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b088 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366163623630663162323836666665396432333364343732643262 Dec 13 14:24:23.690000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:24:23.690000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.690000 audit: BPF prog-id=177 op=LOAD Dec 13 14:24:23.690000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021b498 items=0 ppid=3927 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462366163623630663162323836666665396432333364343732643262 Dec 13 14:24:23.700428 env[1220]: time="2024-12-13T14:24:23.698405925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:23.700428 env[1220]: time="2024-12-13T14:24:23.698528184Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:23.700428 env[1220]: time="2024-12-13T14:24:23.698572151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:23.700428 env[1220]: time="2024-12-13T14:24:23.698838049Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719 pid=3995 runtime=io.containerd.runc.v2 Dec 13 14:24:23.733895 systemd[1]: Started cri-containerd-dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719.scope. Dec 13 14:24:23.750000 audit[3992]: NETFILTER_CFG table=filter:109 family=2 entries=58 op=nft_register_chain pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:23.750000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=29892 a0=3 a1=7ffcf6682950 a2=0 a3=7ffcf668293c items=0 ppid=3281 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:23.784746 env[1220]: time="2024-12-13T14:24:23.784682763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-8kt96,Uid:7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4,Namespace:kube-system,Attempt:1,} returns sandbox id \"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d\"" Dec 13 14:24:23.790178 env[1220]: time="2024-12-13T14:24:23.790128451Z" level=info msg="CreateContainer within sandbox \"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.797000 audit: BPF prog-id=178 op=LOAD Dec 13 14:24:23.799000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.799000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3995 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333165363365303933323662323634313236633662363835633536 Dec 13 14:24:23.800000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.801000 audit: BPF prog-id=179 op=LOAD Dec 13 14:24:23.800000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3995 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333165363365303933323662323634313236633662363835633536 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000121c48 a2=10 a3=1c items=0 ppid=3524 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383439623635386461376166313535633866653261386238333437 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001216b0 a2=3c a3=8 items=0 ppid=3524 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383439623635386461376166313535633866653261386238333437 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit: BPF prog-id=180 op=LOAD Dec 13 14:24:23.802000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001219d8 a2=78 a3=c000219480 items=0 ppid=3524 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383439623635386461376166313535633866653261386238333437 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit: BPF prog-id=181 op=LOAD Dec 13 14:24:23.802000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000121770 a2=78 a3=c0002194c8 items=0 ppid=3524 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383439623635386461376166313535633866653261386238333437 Dec 13 14:24:23.802000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:24:23.802000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.802000 audit: BPF prog-id=182 op=LOAD Dec 13 14:24:23.802000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000121c30 a2=78 a3=c0002198d8 items=0 ppid=3524 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383439623635386461376166313535633866653261386238333437 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.811000 audit: BPF prog-id=183 op=LOAD Dec 13 14:24:23.811000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f8a70 items=0 ppid=3995 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333165363365303933323662323634313236633662363835633536 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit: BPF prog-id=184 op=LOAD Dec 13 14:24:23.812000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f8ab8 items=0 ppid=3995 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333165363365303933323662323634313236633662363835633536 Dec 13 14:24:23.812000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:24:23.812000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.812000 audit: BPF prog-id=185 op=LOAD Dec 13 14:24:23.812000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f8ec8 items=0 ppid=3995 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463333165363365303933323662323634313236633662363835633536 Dec 13 14:24:23.820248 env[1220]: time="2024-12-13T14:24:23.819866849Z" level=info msg="CreateContainer within sandbox \"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"aac7ece184168a1aecf965b403195bbd165e3c356ecf8fca0e5eab2ea269a059\"" Dec 13 14:24:23.821511 env[1220]: time="2024-12-13T14:24:23.821469531Z" level=info msg="StartContainer for \"aac7ece184168a1aecf965b403195bbd165e3c356ecf8fca0e5eab2ea269a059\"" Dec 13 14:24:23.852731 env[1220]: time="2024-12-13T14:24:23.852676053Z" level=info msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" Dec 13 14:24:23.868761 systemd[1]: Started cri-containerd-aac7ece184168a1aecf965b403195bbd165e3c356ecf8fca0e5eab2ea269a059.scope. Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.891000 audit: BPF prog-id=186 op=LOAD Dec 13 14:24:23.892000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.892000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3927 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633765636531383431363861316165636639363562343033313935 Dec 13 14:24:23.892000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.892000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3927 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633765636531383431363861316165636639363562343033313935 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit: BPF prog-id=187 op=LOAD Dec 13 14:24:23.893000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a1100 items=0 ppid=3927 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633765636531383431363861316165636639363562343033313935 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit: BPF prog-id=188 op=LOAD Dec 13 14:24:23.893000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a1148 items=0 ppid=3927 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633765636531383431363861316165636639363562343033313935 Dec 13 14:24:23.893000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:24:23.893000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:23.893000 audit: BPF prog-id=189 op=LOAD Dec 13 14:24:23.893000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a1558 items=0 ppid=3927 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633765636531383431363861316165636639363562343033313935 Dec 13 14:24:23.952041 env[1220]: time="2024-12-13T14:24:23.951988824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-fl59n,Uid:eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719\"" Dec 13 14:24:23.955361 env[1220]: time="2024-12-13T14:24:23.955318135Z" level=info msg="StartContainer for \"78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2\" returns successfully" Dec 13 14:24:24.002936 env[1220]: time="2024-12-13T14:24:24.002791871Z" level=info msg="StartContainer for \"aac7ece184168a1aecf965b403195bbd165e3c356ecf8fca0e5eab2ea269a059\" returns successfully" Dec 13 14:24:24.191860 kubelet[2027]: I1213 14:24:24.191080 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-8kt96" podStartSLOduration=36.191051855 podStartE2EDuration="36.191051855s" podCreationTimestamp="2024-12-13 14:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:24:24.157754127 +0000 UTC m=+40.517224433" watchObservedRunningTime="2024-12-13 14:24:24.191051855 +0000 UTC m=+40.550522150" Dec 13 14:24:24.191860 kubelet[2027]: I1213 14:24:24.191665 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-94d48fcdf-2qzfk" podStartSLOduration=25.946412223 podStartE2EDuration="29.191656867s" podCreationTimestamp="2024-12-13 14:23:55 +0000 UTC" firstStartedPulling="2024-12-13 14:24:20.309614454 +0000 UTC m=+36.669084733" lastFinishedPulling="2024-12-13 14:24:23.554859014 +0000 UTC m=+39.914329377" observedRunningTime="2024-12-13 14:24:24.190806808 +0000 UTC m=+40.550277112" watchObservedRunningTime="2024-12-13 14:24:24.191656867 +0000 UTC m=+40.551127170" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.052 [INFO][4073] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.052 [INFO][4073] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" iface="eth0" netns="/var/run/netns/cni-c906c48f-d6d7-9124-abef-fb1302e3c7b9" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.053 [INFO][4073] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" iface="eth0" netns="/var/run/netns/cni-c906c48f-d6d7-9124-abef-fb1302e3c7b9" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.053 [INFO][4073] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" iface="eth0" netns="/var/run/netns/cni-c906c48f-d6d7-9124-abef-fb1302e3c7b9" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.053 [INFO][4073] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.053 [INFO][4073] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.178 [INFO][4108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.178 [INFO][4108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.178 [INFO][4108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.189 [WARNING][4108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.189 [INFO][4108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.196 [INFO][4108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:24.200993 env[1220]: 2024-12-13 14:24:24.197 [INFO][4073] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:24.206387 systemd[1]: run-netns-cni\x2dc906c48f\x2dd6d7\x2d9124\x2dabef\x2dfb1302e3c7b9.mount: Deactivated successfully. Dec 13 14:24:24.209568 env[1220]: time="2024-12-13T14:24:24.209515428Z" level=info msg="TearDown network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" successfully" Dec 13 14:24:24.209568 env[1220]: time="2024-12-13T14:24:24.209564116Z" level=info msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" returns successfully" Dec 13 14:24:24.210767 env[1220]: time="2024-12-13T14:24:24.210702788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-lf68x,Uid:f5155243-e16e-49bf-95ae-9a9cc29afed5,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:24:24.224000 audit[4118]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:24.224000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe8b8dcc80 a2=0 a3=7ffe8b8dcc6c items=0 ppid=2166 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:24.275000 audit[4118]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:24.275000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe8b8dcc80 a2=0 a3=7ffe8b8dcc6c items=0 ppid=2166 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:24.464481 systemd-networkd[1024]: calia018c7f6fb3: Link UP Dec 13 14:24:24.475029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:24.475154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia018c7f6fb3: link becomes ready Dec 13 14:24:24.483105 systemd-networkd[1024]: calia018c7f6fb3: Gained carrier Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.340 [INFO][4119] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0 calico-apiserver-768cdbc847- calico-apiserver f5155243-e16e-49bf-95ae-9a9cc29afed5 823 0 2024-12-13 14:23:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:768cdbc847 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal calico-apiserver-768cdbc847-lf68x eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia018c7f6fb3 [] []}} ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.340 [INFO][4119] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.390 [INFO][4130] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" HandleID="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.405 [INFO][4130] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" HandleID="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030f230), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", "pod":"calico-apiserver-768cdbc847-lf68x", "timestamp":"2024-12-13 14:24:24.390560085 +0000 UTC"}, Hostname:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.405 [INFO][4130] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.405 [INFO][4130] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.405 [INFO][4130] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal' Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.409 [INFO][4130] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.416 [INFO][4130] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.422 [INFO][4130] ipam/ipam.go 489: Trying affinity for 192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.425 [INFO][4130] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.429 [INFO][4130] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.0/26 host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.429 [INFO][4130] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.0/26 handle="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.431 [INFO][4130] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9 Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.438 [INFO][4130] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.0/26 handle="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.449 [INFO][4130] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.6/26] block=192.168.101.0/26 handle="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.449 [INFO][4130] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.6/26] handle="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" host="ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal" Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.449 [INFO][4130] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:24.502432 env[1220]: 2024-12-13 14:24:24.449 [INFO][4130] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.6/26] IPv6=[] ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" HandleID="k8s-pod-network.02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.452 [INFO][4119] cni-plugin/k8s.go 386: Populated endpoint ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5155243-e16e-49bf-95ae-9a9cc29afed5", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-768cdbc847-lf68x", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia018c7f6fb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.453 [INFO][4119] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.6/32] ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.453 [INFO][4119] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia018c7f6fb3 ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.483 [INFO][4119] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.484 [INFO][4119] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5155243-e16e-49bf-95ae-9a9cc29afed5", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9", Pod:"calico-apiserver-768cdbc847-lf68x", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia018c7f6fb3", MAC:"96:19:9d:61:82:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:24.503666 env[1220]: 2024-12-13 14:24:24.497 [INFO][4119] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9" Namespace="calico-apiserver" Pod="calico-apiserver-768cdbc847-lf68x" WorkloadEndpoint="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:24.538000 audit[4148]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:24:24.538000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fff60a56600 a2=0 a3=7fff60a565ec items=0 ppid=3281 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:24:24.563548 env[1220]: time="2024-12-13T14:24:24.563470270Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:24:24.563841 env[1220]: time="2024-12-13T14:24:24.563800913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:24:24.564004 env[1220]: time="2024-12-13T14:24:24.563967903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:24:24.564360 env[1220]: time="2024-12-13T14:24:24.564316486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9 pid=4156 runtime=io.containerd.runc.v2 Dec 13 14:24:24.600457 systemd[1]: Started cri-containerd-02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9.scope. Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit: BPF prog-id=190 op=LOAD Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4156 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373735313933613366343961643066393037623864663632383136 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4156 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373735313933613366343961643066393037623864663632383136 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.629000 audit: BPF prog-id=191 op=LOAD Dec 13 14:24:24.629000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000025070 items=0 ppid=4156 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373735313933613366343961643066393037623864663632383136 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit: BPF prog-id=192 op=LOAD Dec 13 14:24:24.630000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000250b8 items=0 ppid=4156 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373735313933613366343961643066393037623864663632383136 Dec 13 14:24:24.630000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:24:24.630000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.630000 audit: BPF prog-id=193 op=LOAD Dec 13 14:24:24.630000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000254c8 items=0 ppid=4156 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373735313933613366343961643066393037623864663632383136 Dec 13 14:24:24.677900 env[1220]: time="2024-12-13T14:24:24.677840212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-768cdbc847-lf68x,Uid:f5155243-e16e-49bf-95ae-9a9cc29afed5,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9\"" Dec 13 14:24:24.797358 env[1220]: time="2024-12-13T14:24:24.797206292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.801791 env[1220]: time="2024-12-13T14:24:24.801723404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.804306 env[1220]: time="2024-12-13T14:24:24.804239056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.806307 env[1220]: time="2024-12-13T14:24:24.806251000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:24.807060 env[1220]: time="2024-12-13T14:24:24.807006730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:24:24.810830 env[1220]: time="2024-12-13T14:24:24.810777796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:24:24.813337 env[1220]: time="2024-12-13T14:24:24.813279100Z" level=info msg="CreateContainer within sandbox \"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:24:24.832828 env[1220]: time="2024-12-13T14:24:24.832771409Z" level=info msg="CreateContainer within sandbox \"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"56e699f56cdfe1572cbe3e6727784f39ce6c8e9527d1dcc84da70c54c01caf7b\"" Dec 13 14:24:24.833978 env[1220]: time="2024-12-13T14:24:24.833938475Z" level=info msg="StartContainer for \"56e699f56cdfe1572cbe3e6727784f39ce6c8e9527d1dcc84da70c54c01caf7b\"" Dec 13 14:24:24.861197 systemd[1]: Started cri-containerd-56e699f56cdfe1572cbe3e6727784f39ce6c8e9527d1dcc84da70c54c01caf7b.scope. Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f85f412b888 items=0 ppid=3769 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653639396635366364666531353732636265336536373237373834 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit: BPF prog-id=194 op=LOAD Dec 13 14:24:24.906000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002dbd78 items=0 ppid=3769 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653639396635366364666531353732636265336536373237373834 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit: BPF prog-id=195 op=LOAD Dec 13 14:24:24.906000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002dbdc8 items=0 ppid=3769 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653639396635366364666531353732636265336536373237373834 Dec 13 14:24:24.906000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:24:24.906000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { perfmon } for pid=4197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit[4197]: AVC avc: denied { bpf } for pid=4197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:24.906000 audit: BPF prog-id=196 op=LOAD Dec 13 14:24:24.906000 audit[4197]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002dbe58 items=0 ppid=3769 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653639396635366364666531353732636265336536373237373834 Dec 13 14:24:24.927993 env[1220]: time="2024-12-13T14:24:24.927925894Z" level=info msg="StartContainer for \"56e699f56cdfe1572cbe3e6727784f39ce6c8e9527d1dcc84da70c54c01caf7b\" returns successfully" Dec 13 14:24:25.056139 systemd-networkd[1024]: calic19779ff789: Gained IPv6LL Dec 13 14:24:25.121356 kubelet[2027]: I1213 14:24:25.120429 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:25.162000 audit[4224]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:25.162000 audit[4224]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc2a2e8130 a2=0 a3=7ffc2a2e811c items=0 ppid=2166 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:25.172000 audit[4224]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4224 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:25.172000 audit[4224]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc2a2e8130 a2=0 a3=7ffc2a2e811c items=0 ppid=2166 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:25.312245 systemd-networkd[1024]: cali8f85ae21208: Gained IPv6LL Dec 13 14:24:25.753000 audit[1373]: AVC avc: denied { associate } for pid=1373 comm="google_accounts" name="#aa" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 Dec 13 14:24:25.753000 audit[1373]: SYSCALL arch=c000003e syscall=83 success=no exit=-13 a0=7fafe4a99860 a1=1ff a2=1ff a3=0 items=0 ppid=1325 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:25.753000 audit: PROCTITLE proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E Dec 13 14:24:25.760953 systemd-networkd[1024]: calia018c7f6fb3: Gained IPv6LL Dec 13 14:24:25.765808 google-accounts[1373]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' Dec 13 14:24:27.419755 env[1220]: time="2024-12-13T14:24:27.419691252Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.422410 env[1220]: time="2024-12-13T14:24:27.422359041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.424610 env[1220]: time="2024-12-13T14:24:27.424572863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.426673 env[1220]: time="2024-12-13T14:24:27.426620435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.427447 env[1220]: time="2024-12-13T14:24:27.427404948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:24:27.430711 env[1220]: time="2024-12-13T14:24:27.430634452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:24:27.432527 env[1220]: time="2024-12-13T14:24:27.432469305Z" level=info msg="CreateContainer within sandbox \"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:24:27.452169 env[1220]: time="2024-12-13T14:24:27.452102553Z" level=info msg="CreateContainer within sandbox \"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c166c7ae619561218a5ac947bc8e47e755861069016d419629032fed5bfc95f8\"" Dec 13 14:24:27.453429 env[1220]: time="2024-12-13T14:24:27.453390803Z" level=info msg="StartContainer for \"c166c7ae619561218a5ac947bc8e47e755861069016d419629032fed5bfc95f8\"" Dec 13 14:24:27.499537 systemd[1]: run-containerd-runc-k8s.io-c166c7ae619561218a5ac947bc8e47e755861069016d419629032fed5bfc95f8-runc.Rk2vhf.mount: Deactivated successfully. Dec 13 14:24:27.504154 systemd[1]: Started cri-containerd-c166c7ae619561218a5ac947bc8e47e755861069016d419629032fed5bfc95f8.scope. Dec 13 14:24:27.532141 kernel: kauditd_printk_skb: 531 callbacks suppressed Dec 13 14:24:27.532310 kernel: audit: type=1400 audit(1734099867.526:1274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.575340 kernel: audit: type=1400 audit(1734099867.526:1275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.596360 kernel: audit: type=1400 audit(1734099867.526:1276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.639042 kernel: audit: type=1400 audit(1734099867.526:1277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.639178 kernel: audit: type=1400 audit(1734099867.526:1278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.660327 kernel: audit: type=1400 audit(1734099867.526:1279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.702650 kernel: audit: type=1400 audit(1734099867.526:1280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.702806 kernel: audit: type=1400 audit(1734099867.526:1281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.750279 kernel: audit: type=1400 audit(1734099867.526:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.750658 kernel: audit: type=1400 audit(1734099867.552:1283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.552000 audit: BPF prog-id=197 op=LOAD Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3995 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363663376165363139353631323138613561633934376263386534 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3995 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363663376165363139353631323138613561633934376263386534 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit: BPF prog-id=198 op=LOAD Dec 13 14:24:27.553000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025740 items=0 ppid=3995 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363663376165363139353631323138613561633934376263386534 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit: BPF prog-id=199 op=LOAD Dec 13 14:24:27.553000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025788 items=0 ppid=3995 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363663376165363139353631323138613561633934376263386534 Dec 13 14:24:27.553000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:24:27.553000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.553000 audit: BPF prog-id=200 op=LOAD Dec 13 14:24:27.553000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025b98 items=0 ppid=3995 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363663376165363139353631323138613561633934376263386534 Dec 13 14:24:27.763210 env[1220]: time="2024-12-13T14:24:27.761509582Z" level=info msg="StartContainer for \"c166c7ae619561218a5ac947bc8e47e755861069016d419629032fed5bfc95f8\" returns successfully" Dec 13 14:24:27.771402 env[1220]: time="2024-12-13T14:24:27.771277721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.776049 env[1220]: time="2024-12-13T14:24:27.776000878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.782393 env[1220]: time="2024-12-13T14:24:27.782351931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.789668 env[1220]: time="2024-12-13T14:24:27.788852449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:27.789668 env[1220]: time="2024-12-13T14:24:27.789226674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:24:27.795142 env[1220]: time="2024-12-13T14:24:27.792185375Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:24:27.796565 env[1220]: time="2024-12-13T14:24:27.796205536Z" level=info msg="CreateContainer within sandbox \"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:24:27.825694 env[1220]: time="2024-12-13T14:24:27.825643421Z" level=info msg="CreateContainer within sandbox \"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b3d3de2e4889e51bf13e68d786dc15fda286b0fa3cc99c5389e2a8d84364e03f\"" Dec 13 14:24:27.826811 env[1220]: time="2024-12-13T14:24:27.826769376Z" level=info msg="StartContainer for \"b3d3de2e4889e51bf13e68d786dc15fda286b0fa3cc99c5389e2a8d84364e03f\"" Dec 13 14:24:27.865494 systemd[1]: Started cri-containerd-b3d3de2e4889e51bf13e68d786dc15fda286b0fa3cc99c5389e2a8d84364e03f.scope. Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.925000 audit: BPF prog-id=201 op=LOAD Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4156 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643364653265343838396535316266313365363864373836646331 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4156 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643364653265343838396535316266313365363864373836646331 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.926000 audit: BPF prog-id=202 op=LOAD Dec 13 14:24:27.926000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a9b0 items=0 ppid=4156 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643364653265343838396535316266313365363864373836646331 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit: BPF prog-id=203 op=LOAD Dec 13 14:24:27.927000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a9f8 items=0 ppid=4156 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643364653265343838396535316266313365363864373836646331 Dec 13 14:24:27.927000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:24:27.927000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:27.927000 audit: BPF prog-id=204 op=LOAD Dec 13 14:24:27.927000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ae08 items=0 ppid=4156 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643364653265343838396535316266313365363864373836646331 Dec 13 14:24:27.989635 env[1220]: time="2024-12-13T14:24:27.989502880Z" level=info msg="StartContainer for \"b3d3de2e4889e51bf13e68d786dc15fda286b0fa3cc99c5389e2a8d84364e03f\" returns successfully" Dec 13 14:24:28.173941 kubelet[2027]: I1213 14:24:28.173811 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-768cdbc847-fl59n" podStartSLOduration=30.700538209 podStartE2EDuration="34.173781364s" podCreationTimestamp="2024-12-13 14:23:54 +0000 UTC" firstStartedPulling="2024-12-13 14:24:23.955666835 +0000 UTC m=+40.315137123" lastFinishedPulling="2024-12-13 14:24:27.428909975 +0000 UTC m=+43.788380278" observedRunningTime="2024-12-13 14:24:28.153873774 +0000 UTC m=+44.513344081" watchObservedRunningTime="2024-12-13 14:24:28.173781364 +0000 UTC m=+44.533251667" Dec 13 14:24:28.201000 audit[4302]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:28.201000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe8cb266b0 a2=0 a3=7ffe8cb2669c items=0 ppid=2166 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:28.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:28.207000 audit[4302]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:28.207000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe8cb266b0 a2=0 a3=7ffe8cb2669c items=0 ppid=2166 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:28.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:28.243000 audit[4304]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:28.243000 audit[4304]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff27f42680 a2=0 a3=7fff27f4266c items=0 ppid=2166 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:28.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:28.252000 audit[4304]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:28.252000 audit[4304]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff27f42680 a2=0 a3=7fff27f4266c items=0 ppid=2166 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:28.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:28.454376 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3812627755.mount: Deactivated successfully. Dec 13 14:24:29.125225 env[1220]: time="2024-12-13T14:24:29.125169631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:29.130693 env[1220]: time="2024-12-13T14:24:29.130636341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:29.135096 env[1220]: time="2024-12-13T14:24:29.135060334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:29.139019 env[1220]: time="2024-12-13T14:24:29.138983295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:29.140112 env[1220]: time="2024-12-13T14:24:29.140074293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:24:29.144569 kubelet[2027]: I1213 14:24:29.142771 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:29.144569 kubelet[2027]: I1213 14:24:29.143284 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:29.144758 env[1220]: time="2024-12-13T14:24:29.144385639Z" level=info msg="CreateContainer within sandbox \"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:24:29.173365 env[1220]: time="2024-12-13T14:24:29.173265944Z" level=info msg="CreateContainer within sandbox \"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f7e7f55d696539947050fdf1a8c3e7ceb34e4a72a5dc68d1cafffafac8f080fa\"" Dec 13 14:24:29.174336 env[1220]: time="2024-12-13T14:24:29.174278064Z" level=info msg="StartContainer for \"f7e7f55d696539947050fdf1a8c3e7ceb34e4a72a5dc68d1cafffafac8f080fa\"" Dec 13 14:24:29.245836 systemd[1]: run-containerd-runc-k8s.io-f7e7f55d696539947050fdf1a8c3e7ceb34e4a72a5dc68d1cafffafac8f080fa-runc.f86d7n.mount: Deactivated successfully. Dec 13 14:24:29.249783 systemd[1]: Started cri-containerd-f7e7f55d696539947050fdf1a8c3e7ceb34e4a72a5dc68d1cafffafac8f080fa.scope. Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff3ae8b4d48 items=0 ppid=3769 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653766353564363936353339393437303530666466316138633365 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.395000 audit: BPF prog-id=205 op=LOAD Dec 13 14:24:29.395000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4b68 items=0 ppid=3769 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653766353564363936353339393437303530666466316138633365 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit: BPF prog-id=206 op=LOAD Dec 13 14:24:29.396000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4bb8 items=0 ppid=3769 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653766353564363936353339393437303530666466316138633365 Dec 13 14:24:29.396000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:24:29.396000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:24:29.396000 audit: BPF prog-id=207 op=LOAD Dec 13 14:24:29.396000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4c48 items=0 ppid=3769 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:29.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637653766353564363936353339393437303530666466316138633365 Dec 13 14:24:29.428914 env[1220]: time="2024-12-13T14:24:29.428859291Z" level=info msg="StartContainer for \"f7e7f55d696539947050fdf1a8c3e7ceb34e4a72a5dc68d1cafffafac8f080fa\" returns successfully" Dec 13 14:24:29.999097 kubelet[2027]: I1213 14:24:29.999056 2027 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:24:29.999097 kubelet[2027]: I1213 14:24:29.999099 2027 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:24:30.169745 kubelet[2027]: I1213 14:24:30.169647 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-768cdbc847-lf68x" podStartSLOduration=33.058553325 podStartE2EDuration="36.169602412s" podCreationTimestamp="2024-12-13 14:23:54 +0000 UTC" firstStartedPulling="2024-12-13 14:24:24.679967128 +0000 UTC m=+41.039437416" lastFinishedPulling="2024-12-13 14:24:27.791016215 +0000 UTC m=+44.150486503" observedRunningTime="2024-12-13 14:24:28.175322398 +0000 UTC m=+44.534792692" watchObservedRunningTime="2024-12-13 14:24:30.169602412 +0000 UTC m=+46.529072716" Dec 13 14:24:30.170037 kubelet[2027]: I1213 14:24:30.169886 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7hcsm" podStartSLOduration=28.611121314000002 podStartE2EDuration="35.169875432s" podCreationTimestamp="2024-12-13 14:23:55 +0000 UTC" firstStartedPulling="2024-12-13 14:24:22.582614584 +0000 UTC m=+38.942084865" lastFinishedPulling="2024-12-13 14:24:29.141368693 +0000 UTC m=+45.500838983" observedRunningTime="2024-12-13 14:24:30.167439068 +0000 UTC m=+46.526909371" watchObservedRunningTime="2024-12-13 14:24:30.169875432 +0000 UTC m=+46.529345729" Dec 13 14:24:30.198000 audit[4246]: AVC avc: denied { watch } for pid=4246 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_24_06.418919509/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c713 tclass=file permissive=0 Dec 13 14:24:30.198000 audit[4246]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000617320 a2=fc6 a3=0 items=0 ppid=3995 pid=4246 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c713 key=(null) Dec 13 14:24:30.198000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:30.664000 audit[4282]: AVC avc: denied { watch } for pid=4282 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_24_06.3700392038/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c99,c859 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c99,c859 tclass=file permissive=0 Dec 13 14:24:30.664000 audit[4282]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006d6920 a2=fc6 a3=0 items=0 ppid=4156 pid=4282 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c99,c859 key=(null) Dec 13 14:24:30.664000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:24:31.758150 kubelet[2027]: I1213 14:24:31.757417 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:31.864953 systemd[1]: run-containerd-runc-k8s.io-78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2-runc.86E2o2.mount: Deactivated successfully. Dec 13 14:24:34.323752 kubelet[2027]: I1213 14:24:34.323693 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:34.396000 audit[4390]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:34.404367 kernel: kauditd_printk_skb: 165 callbacks suppressed Dec 13 14:24:34.404476 kernel: audit: type=1325 audit(1734099874.396:1322): table=filter:119 family=2 entries=9 op=nft_register_rule pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:34.421343 kernel: audit: type=1300 audit(1734099874.396:1322): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd5db70190 a2=0 a3=7ffd5db7017c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.396000 audit[4390]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd5db70190 a2=0 a3=7ffd5db7017c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:34.468407 kernel: audit: type=1327 audit(1734099874.396:1322): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:34.456000 audit[4390]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:34.484840 kernel: audit: type=1325 audit(1734099874.456:1323): table=nat:120 family=2 entries=27 op=nft_register_chain pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:34.485731 kernel: audit: type=1300 audit(1734099874.456:1323): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd5db70190 a2=0 a3=7ffd5db7017c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.456000 audit[4390]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd5db70190 a2=0 a3=7ffd5db7017c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:34.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:34.535335 kernel: audit: type=1327 audit(1734099874.456:1323): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:39.854000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:39.854000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:39.907381 kernel: audit: type=1400 audit(1734099879.854:1325): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:39.907601 kernel: audit: type=1400 audit(1734099879.854:1324): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:39.907648 kernel: audit: type=1300 audit(1734099879.854:1324): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f94810 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:39.854000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f94810 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:39.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:39.970724 kernel: audit: type=1327 audit(1734099879.854:1324): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:39.970901 kernel: audit: type=1300 audit(1734099879.854:1325): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013d7f60 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:39.854000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013d7f60 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:39.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:40.033824 kernel: audit: type=1327 audit(1734099879.854:1325): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:40.224000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.224000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.277895 kernel: audit: type=1400 audit(1734099880.224:1326): avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.278063 kernel: audit: type=1400 audit(1734099880.224:1327): avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.278117 kernel: audit: type=1300 audit(1734099880.224:1327): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00eaff020 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.224000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00eaff020 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.340483 kernel: audit: type=1327 audit(1734099880.224:1327): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.224000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e4a4700 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.277000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=527908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.277000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f0bef90 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.363000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.363000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.363000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00eac58c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.363000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00e706d80 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.366000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=527902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:40.366000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00eac5aa0 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:24:40.366000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:24:40.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.77:22-139.178.68.195:52814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:40.772518 systemd[1]: Started sshd@7-10.128.0.77:22-139.178.68.195:52814.service. Dec 13 14:24:41.068000 audit[4403]: USER_ACCT pid=4403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.069621 sshd[4403]: Accepted publickey for core from 139.178.68.195 port 52814 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:41.070000 audit[4403]: CRED_ACQ pid=4403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.070000 audit[4403]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc30a96200 a2=3 a3=0 items=0 ppid=1 pid=4403 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:41.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:41.071536 sshd[4403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:41.081702 systemd[1]: Started session-8.scope. Dec 13 14:24:41.082330 systemd-logind[1222]: New session 8 of user core. Dec 13 14:24:41.090000 audit[4403]: USER_START pid=4403 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.093000 audit[4405]: CRED_ACQ pid=4405 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.402034 sshd[4403]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:41.403000 audit[4403]: USER_END pid=4403 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.403000 audit[4403]: CRED_DISP pid=4403 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:41.407611 systemd-logind[1222]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:24:41.409317 systemd[1]: sshd@7-10.128.0.77:22-139.178.68.195:52814.service: Deactivated successfully. Dec 13 14:24:41.410687 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:24:41.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.77:22-139.178.68.195:52814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:41.411864 systemd-logind[1222]: Removed session 8. Dec 13 14:24:43.806750 env[1220]: time="2024-12-13T14:24:43.806689892Z" level=info msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.862 [WARNING][4449] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bda9bb98-0423-4678-b9df-cc75250bd3e5", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d", Pod:"csi-node-driver-7hcsm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6fe4571030", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.863 [INFO][4449] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.863 [INFO][4449] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" iface="eth0" netns="" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.863 [INFO][4449] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.863 [INFO][4449] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.890 [INFO][4455] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.890 [INFO][4455] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.890 [INFO][4455] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.898 [WARNING][4455] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.898 [INFO][4455] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.900 [INFO][4455] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:43.902731 env[1220]: 2024-12-13 14:24:43.901 [INFO][4449] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:43.903661 env[1220]: time="2024-12-13T14:24:43.902767602Z" level=info msg="TearDown network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" successfully" Dec 13 14:24:43.903661 env[1220]: time="2024-12-13T14:24:43.902809261Z" level=info msg="StopPodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" returns successfully" Dec 13 14:24:43.904009 env[1220]: time="2024-12-13T14:24:43.903962321Z" level=info msg="RemovePodSandbox for \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" Dec 13 14:24:43.904329 env[1220]: time="2024-12-13T14:24:43.904226072Z" level=info msg="Forcibly stopping sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\"" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:43.957 [WARNING][4475] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bda9bb98-0423-4678-b9df-cc75250bd3e5", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4c51d0d4d8a62a2551644ec190b51a8c347fed2ee5230faa2fa193a5c2ffb20d", Pod:"csi-node-driver-7hcsm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic6fe4571030", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:43.957 [INFO][4475] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:43.957 [INFO][4475] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" iface="eth0" netns="" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:43.957 [INFO][4475] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:43.957 [INFO][4475] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.000 [INFO][4481] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.000 [INFO][4481] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.000 [INFO][4481] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.012 [WARNING][4481] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.012 [INFO][4481] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" HandleID="k8s-pod-network.49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-csi--node--driver--7hcsm-eth0" Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.015 [INFO][4481] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.017943 env[1220]: 2024-12-13 14:24:44.016 [INFO][4475] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05" Dec 13 14:24:44.019144 env[1220]: time="2024-12-13T14:24:44.019086025Z" level=info msg="TearDown network for sandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" successfully" Dec 13 14:24:44.024032 env[1220]: time="2024-12-13T14:24:44.023992016Z" level=info msg="RemovePodSandbox \"49ecbd43bbd4f1123475886cf8ac49f811be48a401913be8ce7b0f6fca634c05\" returns successfully" Dec 13 14:24:44.024877 env[1220]: time="2024-12-13T14:24:44.024838479Z" level=info msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.072 [WARNING][4500] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d", Pod:"coredns-6f6b679f8f-8kt96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f85ae21208", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.073 [INFO][4500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.073 [INFO][4500] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" iface="eth0" netns="" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.073 [INFO][4500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.073 [INFO][4500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.101 [INFO][4506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.101 [INFO][4506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.102 [INFO][4506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.111 [WARNING][4506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.111 [INFO][4506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.113 [INFO][4506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.117721 env[1220]: 2024-12-13 14:24:44.114 [INFO][4500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.117721 env[1220]: time="2024-12-13T14:24:44.116278796Z" level=info msg="TearDown network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" successfully" Dec 13 14:24:44.117721 env[1220]: time="2024-12-13T14:24:44.116345121Z" level=info msg="StopPodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" returns successfully" Dec 13 14:24:44.118810 env[1220]: time="2024-12-13T14:24:44.117749582Z" level=info msg="RemovePodSandbox for \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" Dec 13 14:24:44.118810 env[1220]: time="2024-12-13T14:24:44.117795361Z" level=info msg="Forcibly stopping sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\"" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.168 [WARNING][4524] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"7faf7cd7-0eb2-42a0-9296-9fc39fabbdc4", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"4b6acb60f1b286ffe9d233d472d2b9352361ef235e2ee607171f8d1658a04b1d", Pod:"coredns-6f6b679f8f-8kt96", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f85ae21208", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.168 [INFO][4524] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.169 [INFO][4524] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" iface="eth0" netns="" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.169 [INFO][4524] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.169 [INFO][4524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.220 [INFO][4530] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.221 [INFO][4530] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.221 [INFO][4530] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.232 [WARNING][4530] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.232 [INFO][4530] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" HandleID="k8s-pod-network.05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--8kt96-eth0" Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.235 [INFO][4530] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.241458 env[1220]: 2024-12-13 14:24:44.237 [INFO][4524] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba" Dec 13 14:24:44.243015 env[1220]: time="2024-12-13T14:24:44.241463903Z" level=info msg="TearDown network for sandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" successfully" Dec 13 14:24:44.246877 env[1220]: time="2024-12-13T14:24:44.246815385Z" level=info msg="RemovePodSandbox \"05759d8ace8ae8ab994ed5e22e188a3d42b655724808d280b1b71438e4149cba\" returns successfully" Dec 13 14:24:44.247799 env[1220]: time="2024-12-13T14:24:44.247762555Z" level=info msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.293 [WARNING][4547] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719", Pod:"calico-apiserver-768cdbc847-fl59n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic19779ff789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.293 [INFO][4547] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.293 [INFO][4547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" iface="eth0" netns="" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.293 [INFO][4547] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.293 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.320 [INFO][4553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.321 [INFO][4553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.321 [INFO][4553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.329 [WARNING][4553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.329 [INFO][4553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.331 [INFO][4553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.334081 env[1220]: 2024-12-13 14:24:44.332 [INFO][4547] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.334985 env[1220]: time="2024-12-13T14:24:44.334124741Z" level=info msg="TearDown network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" successfully" Dec 13 14:24:44.334985 env[1220]: time="2024-12-13T14:24:44.334167436Z" level=info msg="StopPodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" returns successfully" Dec 13 14:24:44.335685 env[1220]: time="2024-12-13T14:24:44.335642315Z" level=info msg="RemovePodSandbox for \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" Dec 13 14:24:44.335900 env[1220]: time="2024-12-13T14:24:44.335839813Z" level=info msg="Forcibly stopping sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\"" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.396 [WARNING][4572] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"eafc9c4c-6ca8-4947-a6e9-5fcd93d6fdbe", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"dc31e63e09326b264126c6b685c563262e11e0fecca62a79ccd1a69dbc5d9719", Pod:"calico-apiserver-768cdbc847-fl59n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic19779ff789", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.396 [INFO][4572] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.397 [INFO][4572] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" iface="eth0" netns="" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.397 [INFO][4572] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.397 [INFO][4572] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.425 [INFO][4578] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.425 [INFO][4578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.425 [INFO][4578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.435 [WARNING][4578] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.435 [INFO][4578] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" HandleID="k8s-pod-network.9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--fl59n-eth0" Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.437 [INFO][4578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.439744 env[1220]: 2024-12-13 14:24:44.438 [INFO][4572] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69" Dec 13 14:24:44.440539 env[1220]: time="2024-12-13T14:24:44.440420856Z" level=info msg="TearDown network for sandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" successfully" Dec 13 14:24:44.445543 env[1220]: time="2024-12-13T14:24:44.445488852Z" level=info msg="RemovePodSandbox \"9243296f43ecc866770285f5a76d98556c7e79cb924e12c67fd798afa1763c69\" returns successfully" Dec 13 14:24:44.446153 env[1220]: time="2024-12-13T14:24:44.446094053Z" level=info msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.494 [WARNING][4597] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5155243-e16e-49bf-95ae-9a9cc29afed5", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9", Pod:"calico-apiserver-768cdbc847-lf68x", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia018c7f6fb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.494 [INFO][4597] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.495 [INFO][4597] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" iface="eth0" netns="" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.495 [INFO][4597] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.495 [INFO][4597] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.523 [INFO][4603] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.524 [INFO][4603] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.524 [INFO][4603] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.532 [WARNING][4603] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.532 [INFO][4603] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.534 [INFO][4603] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.537980 env[1220]: 2024-12-13 14:24:44.536 [INFO][4597] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.539039 env[1220]: time="2024-12-13T14:24:44.538032616Z" level=info msg="TearDown network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" successfully" Dec 13 14:24:44.539039 env[1220]: time="2024-12-13T14:24:44.538085487Z" level=info msg="StopPodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" returns successfully" Dec 13 14:24:44.539039 env[1220]: time="2024-12-13T14:24:44.538777850Z" level=info msg="RemovePodSandbox for \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" Dec 13 14:24:44.539039 env[1220]: time="2024-12-13T14:24:44.538821631Z" level=info msg="Forcibly stopping sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\"" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.613 [WARNING][4624] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0", GenerateName:"calico-apiserver-768cdbc847-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5155243-e16e-49bf-95ae-9a9cc29afed5", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"768cdbc847", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"02775193a3f49ad0f907b8df62816a7ef12f094717cf918f73c35ed046cd5dd9", Pod:"calico-apiserver-768cdbc847-lf68x", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia018c7f6fb3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.613 [INFO][4624] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.613 [INFO][4624] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" iface="eth0" netns="" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.613 [INFO][4624] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.613 [INFO][4624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.640 [INFO][4630] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.641 [INFO][4630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.641 [INFO][4630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.650 [WARNING][4630] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.650 [INFO][4630] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" HandleID="k8s-pod-network.8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--apiserver--768cdbc847--lf68x-eth0" Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.652 [INFO][4630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.655234 env[1220]: 2024-12-13 14:24:44.653 [INFO][4624] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71" Dec 13 14:24:44.656124 env[1220]: time="2024-12-13T14:24:44.655282121Z" level=info msg="TearDown network for sandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" successfully" Dec 13 14:24:44.660684 env[1220]: time="2024-12-13T14:24:44.660595909Z" level=info msg="RemovePodSandbox \"8a2b8c73927fd35788560cbe87eba437de0d3a3079d4187fc17e163218aeab71\" returns successfully" Dec 13 14:24:44.661727 env[1220]: time="2024-12-13T14:24:44.661670900Z" level=info msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.710 [WARNING][4648] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0", GenerateName:"calico-kube-controllers-94d48fcdf-", Namespace:"calico-system", SelfLink:"", UID:"fbe07029-5ff3-460c-9ac9-3105743263ff", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"94d48fcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c", Pod:"calico-kube-controllers-94d48fcdf-2qzfk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82bf1fb0392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.710 [INFO][4648] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.710 [INFO][4648] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" iface="eth0" netns="" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.710 [INFO][4648] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.711 [INFO][4648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.737 [INFO][4654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.738 [INFO][4654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.738 [INFO][4654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.747 [WARNING][4654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.747 [INFO][4654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.749 [INFO][4654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.752589 env[1220]: 2024-12-13 14:24:44.751 [INFO][4648] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.753736 env[1220]: time="2024-12-13T14:24:44.753683301Z" level=info msg="TearDown network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" successfully" Dec 13 14:24:44.753893 env[1220]: time="2024-12-13T14:24:44.753863723Z" level=info msg="StopPodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" returns successfully" Dec 13 14:24:44.756155 env[1220]: time="2024-12-13T14:24:44.756112238Z" level=info msg="RemovePodSandbox for \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" Dec 13 14:24:44.756286 env[1220]: time="2024-12-13T14:24:44.756160055Z" level=info msg="Forcibly stopping sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\"" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.817 [WARNING][4673] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0", GenerateName:"calico-kube-controllers-94d48fcdf-", Namespace:"calico-system", SelfLink:"", UID:"fbe07029-5ff3-460c-9ac9-3105743263ff", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"94d48fcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"aa9189544cb8ac22a1bd4d1ada14ef535df1f931245593dbd3a73d76b60bda3c", Pod:"calico-kube-controllers-94d48fcdf-2qzfk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali82bf1fb0392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.817 [INFO][4673] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.817 [INFO][4673] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" iface="eth0" netns="" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.817 [INFO][4673] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.817 [INFO][4673] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.850 [INFO][4679] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.850 [INFO][4679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.850 [INFO][4679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.859 [WARNING][4679] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.861 [INFO][4679] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" HandleID="k8s-pod-network.e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-calico--kube--controllers--94d48fcdf--2qzfk-eth0" Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.863 [INFO][4679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.866578 env[1220]: 2024-12-13 14:24:44.865 [INFO][4673] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b" Dec 13 14:24:44.867799 env[1220]: time="2024-12-13T14:24:44.866613724Z" level=info msg="TearDown network for sandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" successfully" Dec 13 14:24:44.871249 env[1220]: time="2024-12-13T14:24:44.871174427Z" level=info msg="RemovePodSandbox \"e586cd1fe54938060f4a6cb2886587dd9eff64b38eb311a0aed31c1693aff29b\" returns successfully" Dec 13 14:24:44.871965 env[1220]: time="2024-12-13T14:24:44.871919355Z" level=info msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.916 [WARNING][4697] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b06d3a28-6e3f-4f05-93f2-51de207fe5d1", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec", Pod:"coredns-6f6b679f8f-vvpdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali387f1de6e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.917 [INFO][4697] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.917 [INFO][4697] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" iface="eth0" netns="" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.917 [INFO][4697] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.917 [INFO][4697] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.946 [INFO][4703] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.947 [INFO][4703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.947 [INFO][4703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.956 [WARNING][4703] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.956 [INFO][4703] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.958 [INFO][4703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:44.960973 env[1220]: 2024-12-13 14:24:44.959 [INFO][4697] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:44.962079 env[1220]: time="2024-12-13T14:24:44.962026401Z" level=info msg="TearDown network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" successfully" Dec 13 14:24:44.962241 env[1220]: time="2024-12-13T14:24:44.962191299Z" level=info msg="StopPodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" returns successfully" Dec 13 14:24:44.962896 env[1220]: time="2024-12-13T14:24:44.962856332Z" level=info msg="RemovePodSandbox for \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" Dec 13 14:24:44.963046 env[1220]: time="2024-12-13T14:24:44.962904899Z" level=info msg="Forcibly stopping sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\"" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.018 [WARNING][4724] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b06d3a28-6e3f-4f05-93f2-51de207fe5d1", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-034c7e77c62bbd795980.c.flatcar-212911.internal", ContainerID:"ded2ae1873c9a4d06525cdfc397513ae903888d077b3c945d7eede1eaa644aec", Pod:"coredns-6f6b679f8f-vvpdj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali387f1de6e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.018 [INFO][4724] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.018 [INFO][4724] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" iface="eth0" netns="" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.018 [INFO][4724] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.018 [INFO][4724] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.050 [INFO][4730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.050 [INFO][4730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.050 [INFO][4730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.058 [WARNING][4730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.058 [INFO][4730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" HandleID="k8s-pod-network.0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Workload="ci--3510--3--6--034c7e77c62bbd795980.c.flatcar--212911.internal-k8s-coredns--6f6b679f8f--vvpdj-eth0" Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.060 [INFO][4730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:24:45.064930 env[1220]: 2024-12-13 14:24:45.061 [INFO][4724] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2" Dec 13 14:24:45.064930 env[1220]: time="2024-12-13T14:24:45.063369606Z" level=info msg="TearDown network for sandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" successfully" Dec 13 14:24:45.069442 env[1220]: time="2024-12-13T14:24:45.069391510Z" level=info msg="RemovePodSandbox \"0283cfaf5b2930ab581b7843791aea713d34bf2916626235b99e0de2fba1c2c2\" returns successfully" Dec 13 14:24:45.600000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.607651 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:24:45.607810 kernel: audit: type=1400 audit(1734099885.600:1341): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.600000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014dd880 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.668006 kernel: audit: type=1300 audit(1734099885.600:1341): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014dd880 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.668184 kernel: audit: type=1327 audit(1734099885.600:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.606000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.722939 kernel: audit: type=1400 audit(1734099885.606:1342): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.723127 kernel: audit: type=1300 audit(1734099885.606:1342): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028e2ca0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.606000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028e2ca0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.606000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.786112 kernel: audit: type=1327 audit(1734099885.606:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.786320 kernel: audit: type=1400 audit(1734099885.610:1343): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.610000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.610000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014dd8a0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.846469 kernel: audit: type=1300 audit(1734099885.610:1343): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014dd8a0 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.875751 kernel: audit: type=1327 audit(1734099885.610:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:45.875940 kernel: audit: type=1400 audit(1734099885.611:1344): avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.611000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:24:45.611000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028e2e40 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:24:45.611000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:24:46.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.77:22-139.178.68.195:35672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:46.448565 systemd[1]: Started sshd@8-10.128.0.77:22-139.178.68.195:35672.service. Dec 13 14:24:46.740000 audit[4737]: USER_ACCT pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:46.741257 sshd[4737]: Accepted publickey for core from 139.178.68.195 port 35672 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:46.742000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:46.742000 audit[4737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd654fcb00 a2=3 a3=0 items=0 ppid=1 pid=4737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:46.742000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:46.743752 sshd[4737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:46.750853 systemd[1]: Started session-9.scope. Dec 13 14:24:46.752232 systemd-logind[1222]: New session 9 of user core. Dec 13 14:24:46.760000 audit[4737]: USER_START pid=4737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:46.763000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:47.038723 sshd[4737]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:47.040000 audit[4737]: USER_END pid=4737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:47.041000 audit[4737]: CRED_DISP pid=4737 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:47.043956 systemd-logind[1222]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:24:47.044329 systemd[1]: sshd@8-10.128.0.77:22-139.178.68.195:35672.service: Deactivated successfully. Dec 13 14:24:47.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.77:22-139.178.68.195:35672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:47.045784 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:24:47.047099 systemd-logind[1222]: Removed session 9. Dec 13 14:24:49.942226 kubelet[2027]: I1213 14:24:49.942176 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:24:49.999000 audit[4751]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:49.999000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd0ada63d0 a2=0 a3=7ffd0ada63bc items=0 ppid=2166 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:49.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:50.004000 audit[4751]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:24:50.004000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0ada63d0 a2=0 a3=7ffd0ada63bc items=0 ppid=2166 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:50.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:24:52.119227 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:24:52.119431 kernel: audit: type=1130 audit(1734099892.087:1356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.77:22-139.178.68.195:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:52.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.77:22-139.178.68.195:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:52.087989 systemd[1]: Started sshd@9-10.128.0.77:22-139.178.68.195:35684.service. Dec 13 14:24:52.388000 audit[4753]: USER_ACCT pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.419332 kernel: audit: type=1101 audit(1734099892.388:1357): pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.419422 sshd[4753]: Accepted publickey for core from 139.178.68.195 port 35684 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:52.421532 sshd[4753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:52.420000 audit[4753]: CRED_ACQ pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.431968 systemd[1]: Started session-10.scope. Dec 13 14:24:52.433285 systemd-logind[1222]: New session 10 of user core. Dec 13 14:24:52.449753 kernel: audit: type=1103 audit(1734099892.420:1358): pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.449889 kernel: audit: type=1006 audit(1734099892.420:1359): pid=4753 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:24:52.420000 audit[4753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27c52b40 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:52.466395 kernel: audit: type=1300 audit(1734099892.420:1359): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc27c52b40 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:52.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:52.503408 kernel: audit: type=1327 audit(1734099892.420:1359): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:52.503542 kernel: audit: type=1105 audit(1734099892.444:1360): pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.444000 audit[4753]: USER_START pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.447000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.560136 kernel: audit: type=1103 audit(1734099892.447:1361): pid=4755 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.708931 sshd[4753]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:52.711000 audit[4753]: USER_END pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.711000 audit[4753]: CRED_DISP pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.746630 systemd[1]: sshd@9-10.128.0.77:22-139.178.68.195:35684.service: Deactivated successfully. Dec 13 14:24:52.747886 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:24:52.750370 systemd-logind[1222]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:24:52.752580 systemd-logind[1222]: Removed session 10. Dec 13 14:24:52.769533 kernel: audit: type=1106 audit(1734099892.711:1362): pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.769672 kernel: audit: type=1104 audit(1734099892.711:1363): pid=4753 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:52.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.77:22-139.178.68.195:35684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:52.777521 systemd[1]: Started sshd@10-10.128.0.77:22-139.178.68.195:35694.service. Dec 13 14:24:52.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.77:22-139.178.68.195:35694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.067000 audit[4766]: USER_ACCT pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.068282 sshd[4766]: Accepted publickey for core from 139.178.68.195 port 35694 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:53.069000 audit[4766]: CRED_ACQ pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.069000 audit[4766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd35489a10 a2=3 a3=0 items=0 ppid=1 pid=4766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:53.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:53.070431 sshd[4766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:53.077933 systemd-logind[1222]: New session 11 of user core. Dec 13 14:24:53.078693 systemd[1]: Started session-11.scope. Dec 13 14:24:53.087000 audit[4766]: USER_START pid=4766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.090000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.405285 sshd[4766]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:53.406000 audit[4766]: USER_END pid=4766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.406000 audit[4766]: CRED_DISP pid=4766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.410078 systemd-logind[1222]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:24:53.410418 systemd[1]: sshd@10-10.128.0.77:22-139.178.68.195:35694.service: Deactivated successfully. Dec 13 14:24:53.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.77:22-139.178.68.195:35694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.411641 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:24:53.412958 systemd-logind[1222]: Removed session 11. Dec 13 14:24:53.450568 systemd[1]: Started sshd@11-10.128.0.77:22-139.178.68.195:35710.service. Dec 13 14:24:53.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.77:22-139.178.68.195:35710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:53.738000 audit[4775]: USER_ACCT pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.739465 sshd[4775]: Accepted publickey for core from 139.178.68.195 port 35710 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:53.740000 audit[4775]: CRED_ACQ pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.740000 audit[4775]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcae8ef890 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:53.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:53.741541 sshd[4775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:53.748280 systemd-logind[1222]: New session 12 of user core. Dec 13 14:24:53.749112 systemd[1]: Started session-12.scope. Dec 13 14:24:53.757000 audit[4775]: USER_START pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:53.760000 audit[4777]: CRED_ACQ pid=4777 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:54.091258 sshd[4775]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:54.092000 audit[4775]: USER_END pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:54.092000 audit[4775]: CRED_DISP pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:54.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.77:22-139.178.68.195:35710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:54.096603 systemd[1]: sshd@11-10.128.0.77:22-139.178.68.195:35710.service: Deactivated successfully. Dec 13 14:24:54.097959 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:24:54.099020 systemd-logind[1222]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:24:54.101521 systemd-logind[1222]: Removed session 12. Dec 13 14:24:56.811853 systemd[1]: run-containerd-runc-k8s.io-78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2-runc.PEypxB.mount: Deactivated successfully. Dec 13 14:24:59.169910 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:24:59.170056 kernel: audit: type=1130 audit(1734099899.138:1383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.77:22-139.178.68.195:59566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:59.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.77:22-139.178.68.195:59566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:59.139481 systemd[1]: Started sshd@12-10.128.0.77:22-139.178.68.195:59566.service. Dec 13 14:24:59.434000 audit[4814]: USER_ACCT pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.465549 kernel: audit: type=1101 audit(1734099899.434:1384): pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.465669 sshd[4814]: Accepted publickey for core from 139.178.68.195 port 59566 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:24:59.466887 sshd[4814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:59.464000 audit[4814]: CRED_ACQ pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.474911 systemd[1]: Started session-13.scope. Dec 13 14:24:59.477026 systemd-logind[1222]: New session 13 of user core. Dec 13 14:24:59.514118 kernel: audit: type=1103 audit(1734099899.464:1385): pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.514263 kernel: audit: type=1006 audit(1734099899.465:1386): pid=4814 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:24:59.516728 kernel: audit: type=1300 audit(1734099899.465:1386): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca9a867c0 a2=3 a3=0 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.465000 audit[4814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca9a867c0 a2=3 a3=0 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:59.551279 kernel: audit: type=1327 audit(1734099899.465:1386): proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:59.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:59.485000 audit[4814]: USER_START pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.584462 kernel: audit: type=1105 audit(1734099899.485:1387): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.584648 kernel: audit: type=1103 audit(1734099899.488:1388): pid=4816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.488000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.757920 sshd[4814]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:59.759000 audit[4814]: USER_END pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.793328 kernel: audit: type=1106 audit(1734099899.759:1389): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.759000 audit[4814]: CRED_DISP pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:24:59.796870 systemd[1]: sshd@12-10.128.0.77:22-139.178.68.195:59566.service: Deactivated successfully. Dec 13 14:24:59.798603 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:24:59.800942 systemd-logind[1222]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:24:59.802895 systemd-logind[1222]: Removed session 13. Dec 13 14:24:59.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.77:22-139.178.68.195:59566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:59.818421 kernel: audit: type=1104 audit(1734099899.759:1390): pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:01.793072 systemd[1]: run-containerd-runc-k8s.io-78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2-runc.sdD2Qt.mount: Deactivated successfully. Dec 13 14:25:04.806134 systemd[1]: Started sshd@13-10.128.0.77:22-139.178.68.195:59574.service. Dec 13 14:25:04.837409 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:25:04.837581 kernel: audit: type=1130 audit(1734099904.805:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.77:22-139.178.68.195:59574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:04.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.77:22-139.178.68.195:59574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:05.101000 audit[4853]: USER_ACCT pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.133515 kernel: audit: type=1101 audit(1734099905.101:1393): pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.133631 sshd[4853]: Accepted publickey for core from 139.178.68.195 port 59574 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:05.133464 sshd[4853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:05.131000 audit[4853]: CRED_ACQ pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.142221 systemd[1]: Started session-14.scope. Dec 13 14:25:05.144258 systemd-logind[1222]: New session 14 of user core. Dec 13 14:25:05.160380 kernel: audit: type=1103 audit(1734099905.131:1394): pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.160948 kernel: audit: type=1006 audit(1734099905.131:1395): pid=4853 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:25:05.131000 audit[4853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe830f0090 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:05.205589 kernel: audit: type=1300 audit(1734099905.131:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe830f0090 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:05.205779 kernel: audit: type=1327 audit(1734099905.131:1395): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:05.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:05.153000 audit[4853]: USER_START pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.247185 kernel: audit: type=1105 audit(1734099905.153:1396): pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.247538 kernel: audit: type=1103 audit(1734099905.157:1397): pid=4855 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.157000 audit[4855]: CRED_ACQ pid=4855 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.414419 sshd[4853]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:05.416000 audit[4853]: USER_END pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.420423 systemd[1]: sshd@13-10.128.0.77:22-139.178.68.195:59574.service: Deactivated successfully. Dec 13 14:25:05.421719 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:25:05.424867 systemd-logind[1222]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:25:05.426648 systemd-logind[1222]: Removed session 14. Dec 13 14:25:05.416000 audit[4853]: CRED_DISP pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.474345 kernel: audit: type=1106 audit(1734099905.416:1398): pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.474561 kernel: audit: type=1104 audit(1734099905.416:1399): pid=4853 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:05.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.77:22-139.178.68.195:59574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.461532 systemd[1]: Started sshd@14-10.128.0.77:22-139.178.68.195:39428.service. Dec 13 14:25:10.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.77:22-139.178.68.195:39428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.467215 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:25:10.467364 kernel: audit: type=1130 audit(1734099910.461:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.77:22-139.178.68.195:39428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.773000 audit[4865]: USER_ACCT pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.804199 sshd[4865]: Accepted publickey for core from 139.178.68.195 port 39428 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:10.804734 kernel: audit: type=1101 audit(1734099910.773:1402): pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.805516 sshd[4865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:10.804000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.819227 systemd[1]: Started session-15.scope. Dec 13 14:25:10.821189 systemd-logind[1222]: New session 15 of user core. Dec 13 14:25:10.833674 kernel: audit: type=1103 audit(1734099910.804:1403): pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.804000 audit[4865]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2f53e7e0 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:10.879341 kernel: audit: type=1006 audit(1734099910.804:1404): pid=4865 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:25:10.879525 kernel: audit: type=1300 audit(1734099910.804:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2f53e7e0 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:10.879576 kernel: audit: type=1327 audit(1734099910.804:1404): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:10.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:10.829000 audit[4865]: USER_START pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.921369 kernel: audit: type=1105 audit(1734099910.829:1405): pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.931582 kernel: audit: type=1103 audit(1734099910.833:1406): pid=4867 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:10.833000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:11.098008 sshd[4865]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:11.098000 audit[4865]: USER_END pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:11.134103 kernel: audit: type=1106 audit(1734099911.098:1407): pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:11.134221 kernel: audit: type=1104 audit(1734099911.132:1408): pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:11.132000 audit[4865]: CRED_DISP pid=4865 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:11.136523 systemd[1]: sshd@14-10.128.0.77:22-139.178.68.195:39428.service: Deactivated successfully. Dec 13 14:25:11.137794 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:25:11.140230 systemd-logind[1222]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:25:11.141983 systemd-logind[1222]: Removed session 15. Dec 13 14:25:11.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.77:22-139.178.68.195:39428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:11.562264 systemd[1]: run-containerd-runc-k8s.io-4f8de6af134455cf59d7d08189e331954085dc46afecd5bd921c22d06ef82b8e-runc.dU09eX.mount: Deactivated successfully. Dec 13 14:25:16.146093 systemd[1]: Started sshd@15-10.128.0.77:22-139.178.68.195:60418.service. Dec 13 14:25:16.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.77:22-139.178.68.195:60418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:16.153783 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:25:16.153891 kernel: audit: type=1130 audit(1734099916.145:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.77:22-139.178.68.195:60418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:16.453000 audit[4899]: USER_ACCT pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.456352 sshd[4899]: Accepted publickey for core from 139.178.68.195 port 60418 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:16.485338 kernel: audit: type=1101 audit(1734099916.453:1411): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.485704 sshd[4899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:16.483000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.495004 systemd[1]: Started session-16.scope. Dec 13 14:25:16.497043 systemd-logind[1222]: New session 16 of user core. Dec 13 14:25:16.514351 kernel: audit: type=1103 audit(1734099916.483:1412): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.533324 kernel: audit: type=1006 audit(1734099916.483:1413): pid=4899 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:25:16.483000 audit[4899]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff01bbe140 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:16.563981 kernel: audit: type=1300 audit(1734099916.483:1413): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff01bbe140 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:16.483000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:16.590368 kernel: audit: type=1327 audit(1734099916.483:1413): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:16.590509 kernel: audit: type=1105 audit(1734099916.513:1414): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.513000 audit[4899]: USER_START pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.521000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.632929 kernel: audit: type=1103 audit(1734099916.521:1415): pid=4901 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.826625 sshd[4899]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:16.827000 audit[4899]: USER_END pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.862365 kernel: audit: type=1106 audit(1734099916.827:1416): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.863137 systemd[1]: sshd@15-10.128.0.77:22-139.178.68.195:60418.service: Deactivated successfully. Dec 13 14:25:16.864935 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:25:16.833000 audit[4899]: CRED_DISP pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.77:22-139.178.68.195:60418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:16.893321 kernel: audit: type=1104 audit(1734099916.833:1417): pid=4899 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:16.893364 systemd-logind[1222]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:25:16.896468 systemd[1]: Started sshd@16-10.128.0.77:22-139.178.68.195:60428.service. Dec 13 14:25:16.898898 systemd-logind[1222]: Removed session 16. Dec 13 14:25:16.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.77:22-139.178.68.195:60428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.193857 sshd[4912]: Accepted publickey for core from 139.178.68.195 port 60428 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:17.192000 audit[4912]: USER_ACCT pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.196957 sshd[4912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:17.194000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.195000 audit[4912]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe64166b60 a2=3 a3=0 items=0 ppid=1 pid=4912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:17.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:17.204657 systemd-logind[1222]: New session 17 of user core. Dec 13 14:25:17.206015 systemd[1]: Started session-17.scope. Dec 13 14:25:17.213000 audit[4912]: USER_START pid=4912 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.216000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.625420 sshd[4912]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:17.626000 audit[4912]: USER_END pid=4912 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.626000 audit[4912]: CRED_DISP pid=4912 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.631195 systemd-logind[1222]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:25:17.631812 systemd[1]: sshd@16-10.128.0.77:22-139.178.68.195:60428.service: Deactivated successfully. Dec 13 14:25:17.633112 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:25:17.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.77:22-139.178.68.195:60428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.635341 systemd-logind[1222]: Removed session 17. Dec 13 14:25:17.674448 systemd[1]: Started sshd@17-10.128.0.77:22-139.178.68.195:60430.service. Dec 13 14:25:17.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.77:22-139.178.68.195:60430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.974000 audit[4922]: USER_ACCT pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.975350 sshd[4922]: Accepted publickey for core from 139.178.68.195 port 60430 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:17.976000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.976000 audit[4922]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf00040b0 a2=3 a3=0 items=0 ppid=1 pid=4922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:17.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:17.977863 sshd[4922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:17.986420 systemd[1]: Started session-18.scope. Dec 13 14:25:17.987465 systemd-logind[1222]: New session 18 of user core. Dec 13 14:25:17.996000 audit[4922]: USER_START pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:17.999000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:20.708000 audit[4936]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.708000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc3a27b530 a2=0 a3=7ffc3a27b51c items=0 ppid=2166 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.715000 audit[4936]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.715000 audit[4936]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc3a27b530 a2=0 a3=7ffc3a27b51c items=0 ppid=2166 pid=4936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.715000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.738000 audit[4938]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.738000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffd4074d40 a2=0 a3=7fffd4074d2c items=0 ppid=2166 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.743000 audit[4938]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:20.743000 audit[4938]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd4074d40 a2=0 a3=0 items=0 ppid=2166 pid=4938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:20.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:20.754975 sshd[4922]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:20.756000 audit[4922]: USER_END pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:20.757000 audit[4922]: CRED_DISP pid=4922 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:20.760765 systemd-logind[1222]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:25:20.761413 systemd[1]: sshd@17-10.128.0.77:22-139.178.68.195:60430.service: Deactivated successfully. Dec 13 14:25:20.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.77:22-139.178.68.195:60430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:20.762639 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:25:20.764751 systemd-logind[1222]: Removed session 18. Dec 13 14:25:20.801956 systemd[1]: Started sshd@18-10.128.0.77:22-139.178.68.195:60432.service. Dec 13 14:25:20.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.77:22-139.178.68.195:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.098000 audit[4941]: USER_ACCT pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.101751 sshd[4941]: Accepted publickey for core from 139.178.68.195 port 60432 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:21.100000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.101000 audit[4941]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa276c900 a2=3 a3=0 items=0 ppid=1 pid=4941 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:21.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:21.102891 sshd[4941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:21.111827 systemd[1]: Started session-19.scope. Dec 13 14:25:21.113371 systemd-logind[1222]: New session 19 of user core. Dec 13 14:25:21.122000 audit[4941]: USER_START pid=4941 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.124000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.630913 sshd[4941]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:21.639396 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:25:21.639528 kernel: audit: type=1106 audit(1734099921.631:1447): pid=4941 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.631000 audit[4941]: USER_END pid=4941 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.635824 systemd[1]: sshd@18-10.128.0.77:22-139.178.68.195:60432.service: Deactivated successfully. Dec 13 14:25:21.637090 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:25:21.641440 systemd-logind[1222]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:25:21.643130 systemd-logind[1222]: Removed session 19. Dec 13 14:25:21.631000 audit[4941]: CRED_DISP pid=4941 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.696018 kernel: audit: type=1104 audit(1734099921.631:1448): pid=4941 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:21.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.77:22-139.178.68.195:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.709302 systemd[1]: Started sshd@19-10.128.0.77:22-139.178.68.195:60440.service. Dec 13 14:25:21.721688 kernel: audit: type=1131 audit(1734099921.632:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.77:22-139.178.68.195:60432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.77:22-139.178.68.195:60440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.748352 kernel: audit: type=1130 audit(1734099921.706:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.77:22-139.178.68.195:60440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.024000 audit[4951]: USER_ACCT pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.056238 sshd[4951]: Accepted publickey for core from 139.178.68.195 port 60440 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:22.056733 kernel: audit: type=1101 audit(1734099922.024:1451): pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.055000 audit[4951]: CRED_ACQ pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.057348 sshd[4951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:22.070464 systemd[1]: Started session-20.scope. Dec 13 14:25:22.072566 systemd-logind[1222]: New session 20 of user core. Dec 13 14:25:22.083718 kernel: audit: type=1103 audit(1734099922.055:1452): pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.083804 kernel: audit: type=1006 audit(1734099922.055:1453): pid=4951 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 14:25:22.055000 audit[4951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd24da990 a2=3 a3=0 items=0 ppid=1 pid=4951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:22.101786 kernel: audit: type=1300 audit(1734099922.055:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd24da990 a2=3 a3=0 items=0 ppid=1 pid=4951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:22.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:22.137394 kernel: audit: type=1327 audit(1734099922.055:1453): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:22.137530 kernel: audit: type=1105 audit(1734099922.083:1454): pid=4951 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.083000 audit[4951]: USER_START pid=4951 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.089000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.359744 sshd[4951]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:22.361000 audit[4951]: USER_END pid=4951 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.361000 audit[4951]: CRED_DISP pid=4951 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:22.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.77:22-139.178.68.195:60440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.365094 systemd-logind[1222]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:25:22.365435 systemd[1]: sshd@19-10.128.0.77:22-139.178.68.195:60440.service: Deactivated successfully. Dec 13 14:25:22.366684 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:25:22.367918 systemd-logind[1222]: Removed session 20. Dec 13 14:25:27.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.77:22-139.178.68.195:39824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:27.408352 systemd[1]: Started sshd@20-10.128.0.77:22-139.178.68.195:39824.service. Dec 13 14:25:27.414611 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:25:27.414735 kernel: audit: type=1130 audit(1734099927.407:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.77:22-139.178.68.195:39824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:27.704000 audit[4963]: USER_ACCT pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.706507 sshd[4963]: Accepted publickey for core from 139.178.68.195 port 39824 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:27.734000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.736937 sshd[4963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:27.748503 systemd[1]: Started session-21.scope. Dec 13 14:25:27.755319 systemd-logind[1222]: New session 21 of user core. Dec 13 14:25:27.761482 kernel: audit: type=1101 audit(1734099927.704:1460): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.761612 kernel: audit: type=1103 audit(1734099927.734:1461): pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.781799 kernel: audit: type=1006 audit(1734099927.735:1462): pid=4963 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 14:25:27.781963 kernel: audit: type=1300 audit(1734099927.735:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde6be21e0 a2=3 a3=0 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.735000 audit[4963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde6be21e0 a2=3 a3=0 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:27.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:27.817607 kernel: audit: type=1327 audit(1734099927.735:1462): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:27.766000 audit[4963]: USER_START pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.850195 kernel: audit: type=1105 audit(1734099927.766:1463): pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.850366 kernel: audit: type=1103 audit(1734099927.770:1464): pid=4965 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:27.770000 audit[4965]: CRED_ACQ pid=4965 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:28.020201 sshd[4963]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:28.021000 audit[4963]: USER_END pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:28.025910 systemd[1]: sshd@20-10.128.0.77:22-139.178.68.195:39824.service: Deactivated successfully. Dec 13 14:25:28.027125 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:25:28.029448 systemd-logind[1222]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:25:28.030994 systemd-logind[1222]: Removed session 21. Dec 13 14:25:28.022000 audit[4963]: CRED_DISP pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:28.079895 kernel: audit: type=1106 audit(1734099928.021:1465): pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:28.080048 kernel: audit: type=1104 audit(1734099928.022:1466): pid=4963 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:28.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.77:22-139.178.68.195:39824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:28.780000 audit[4975]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:28.780000 audit[4975]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe3ba34800 a2=0 a3=7ffe3ba347ec items=0 ppid=2166 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:28.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:28.785000 audit[4975]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=4975 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:28.785000 audit[4975]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe3ba34800 a2=0 a3=7ffe3ba347ec items=0 ppid=2166 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:28.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:30.200000 audit[4246]: AVC avc: denied { watch } for pid=4246 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_24_06.418919509/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c713 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c713 tclass=file permissive=0 Dec 13 14:25:30.200000 audit[4246]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001248280 a2=fc6 a3=0 items=0 ppid=3995 pid=4246 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c713 key=(null) Dec 13 14:25:30.200000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:25:30.666000 audit[4282]: AVC avc: denied { watch } for pid=4282 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_24_06.3700392038/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c99,c859 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c99,c859 tclass=file permissive=0 Dec 13 14:25:30.666000 audit[4282]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001782be0 a2=fc6 a3=0 items=0 ppid=4156 pid=4282 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c99,c859 key=(null) Dec 13 14:25:30.666000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:25:31.791624 systemd[1]: run-containerd-runc-k8s.io-78849b658da7af155c8fe2a8b8347305e17e34bb85eae3aaf48e0f65bac12be2-runc.f51eJl.mount: Deactivated successfully. Dec 13 14:25:33.067971 systemd[1]: Started sshd@21-10.128.0.77:22-139.178.68.195:39836.service. Dec 13 14:25:33.100596 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:25:33.100730 kernel: audit: type=1130 audit(1734099933.067:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.77:22-139.178.68.195:39836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.77:22-139.178.68.195:39836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.361000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.365160 sshd[4997]: Accepted publickey for core from 139.178.68.195 port 39836 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:33.393332 kernel: audit: type=1101 audit(1734099933.361:1473): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.392000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.394039 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:33.407399 systemd[1]: Started session-22.scope. Dec 13 14:25:33.409770 systemd-logind[1222]: New session 22 of user core. Dec 13 14:25:33.419896 kernel: audit: type=1103 audit(1734099933.392:1474): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.437529 kernel: audit: type=1006 audit(1734099933.392:1475): pid=4997 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:25:33.437663 kernel: audit: type=1300 audit(1734099933.392:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80a906d0 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:33.392000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80a906d0 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:33.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:33.474035 kernel: audit: type=1327 audit(1734099933.392:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:33.474169 kernel: audit: type=1105 audit(1734099933.418:1476): pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.418000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.423000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.530639 kernel: audit: type=1103 audit(1734099933.423:1477): pid=4999 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.670984 sshd[4997]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:33.672000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.676512 systemd[1]: sshd@21-10.128.0.77:22-139.178.68.195:39836.service: Deactivated successfully. Dec 13 14:25:33.677738 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:25:33.680145 systemd-logind[1222]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:25:33.682081 systemd-logind[1222]: Removed session 22. Dec 13 14:25:33.672000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.706345 kernel: audit: type=1106 audit(1734099933.672:1478): pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.706412 kernel: audit: type=1104 audit(1734099933.672:1479): pid=4997 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:33.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.77:22-139.178.68.195:39836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:38.750518 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:25:38.750814 kernel: audit: type=1130 audit(1734099938.717:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.77:22-139.178.68.195:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:38.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.77:22-139.178.68.195:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:38.718705 systemd[1]: Started sshd@22-10.128.0.77:22-139.178.68.195:60100.service. Dec 13 14:25:38.814000 audit[1373]: AVC avc: denied { associate } for pid=1373 comm="google_accounts" name="#ba" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 Dec 13 14:25:38.817205 google-accounts[1373]: ERROR Exception calling the response handler. [Errno 13] Permission denied: '/var/lib/google'. Traceback (most recent call last): File "/usr/lib/python3.9/site-packages/google_compute_engine/metadata_watcher.py", line 200, in WatchMetadata handler(response) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_daemon.py", line 285, in HandleAccounts self.utils.SetConfiguredUsers(desired_users.keys()) File "/usr/lib/python3.9/site-packages/google_compute_engine/accounts/accounts_utils.py", line 324, in SetConfiguredUsers os.makedirs(self.google_users_dir) File "/usr/lib/python-exec/python3.9/../../../lib/python3.9/os.py", line 225, in makedirs mkdir(name, mode) PermissionError: [Errno 13] Permission denied: '/var/lib/google' Dec 13 14:25:38.847996 kernel: audit: type=1400 audit(1734099938.814:1482): avc: denied { associate } for pid=1373 comm="google_accounts" name="#ba" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=0 Dec 13 14:25:38.848210 kernel: audit: type=1300 audit(1734099938.814:1482): arch=c000003e syscall=83 success=no exit=-13 a0=7fafe4a99b90 a1=1ff a2=1ff a3=0 items=0 ppid=1325 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:38.814000 audit[1373]: SYSCALL arch=c000003e syscall=83 success=no exit=-13 a0=7fafe4a99b90 a1=1ff a2=1ff a3=0 items=0 ppid=1325 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="google_accounts" exe="/usr/bin/python3.9" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:38.814000 audit: PROCTITLE proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E Dec 13 14:25:38.888321 kernel: audit: type=1327 audit(1734099938.814:1482): proctitle=2F7573722F6C69622F707974686F6E2D657865632F707974686F6E332E392F707974686F6E33002F7573722F62696E2F676F6F676C655F6163636F756E74735F6461656D6F6E Dec 13 14:25:39.038000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.040708 sshd[5014]: Accepted publickey for core from 139.178.68.195 port 60100 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:39.070492 kernel: audit: type=1101 audit(1734099939.038:1483): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.071764 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:39.069000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.081595 systemd[1]: Started session-23.scope. Dec 13 14:25:39.084100 systemd-logind[1222]: New session 23 of user core. Dec 13 14:25:39.100326 kernel: audit: type=1103 audit(1734099939.069:1484): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.069000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe157fdb30 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.144950 kernel: audit: type=1006 audit(1734099939.069:1485): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:25:39.145126 kernel: audit: type=1300 audit(1734099939.069:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe157fdb30 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.145175 kernel: audit: type=1327 audit(1734099939.069:1485): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:39.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:39.096000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.186723 kernel: audit: type=1105 audit(1734099939.096:1486): pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.100000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.347340 sshd[5014]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:39.348000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.348000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:39.352411 systemd-logind[1222]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:25:39.352844 systemd[1]: sshd@22-10.128.0.77:22-139.178.68.195:60100.service: Deactivated successfully. Dec 13 14:25:39.354121 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:25:39.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.77:22-139.178.68.195:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:39.356065 systemd-logind[1222]: Removed session 23. Dec 13 14:25:39.854000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:39.854000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b11710 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:39.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:39.856000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:39.856000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002758680 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:39.856000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:40.224000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.224000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.224000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00e281100 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:40.224000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f186720 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:40.282000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=527908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.282000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0073f5980 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:40.363000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.363000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00e2812e0 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:40.363000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=527906 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.363000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f186780 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.363000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:40.367000 audit[1908]: AVC avc: denied { watch } for pid=1908 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=527902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:40.367000 audit[1908]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f1867e0 a2=fc6 a3=0 items=0 ppid=1753 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c881 key=(null) Dec 13 14:25:40.367000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3737002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:25:44.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.77:22-139.178.68.195:60116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:44.394235 systemd[1]: Started sshd@23-10.128.0.77:22-139.178.68.195:60116.service. Dec 13 14:25:44.401264 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 14:25:44.426027 kernel: audit: type=1130 audit(1734099944.393:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.77:22-139.178.68.195:60116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:44.689000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.720332 kernel: audit: type=1101 audit(1734099944.689:1500): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.720408 sshd[5051]: Accepted publickey for core from 139.178.68.195 port 60116 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:25:44.721184 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:44.719000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.738705 systemd[1]: Started session-24.scope. Dec 13 14:25:44.740692 systemd-logind[1222]: New session 24 of user core. Dec 13 14:25:44.749676 kernel: audit: type=1103 audit(1734099944.719:1501): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.719000 audit[5051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4ff96450 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.796537 kernel: audit: type=1006 audit(1734099944.719:1502): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:25:44.796696 kernel: audit: type=1300 audit(1734099944.719:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4ff96450 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.796743 kernel: audit: type=1327 audit(1734099944.719:1502): proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:44.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:44.749000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.838355 kernel: audit: type=1105 audit(1734099944.749:1503): pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.838498 kernel: audit: type=1103 audit(1734099944.752:1504): pid=5055 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.752000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:44.996145 sshd[5051]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:44.996000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:45.031327 kernel: audit: type=1106 audit(1734099944.996:1505): pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:45.030000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:45.034777 systemd[1]: sshd@23-10.128.0.77:22-139.178.68.195:60116.service: Deactivated successfully. Dec 13 14:25:45.036027 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:25:45.038964 systemd-logind[1222]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:25:45.040689 systemd-logind[1222]: Removed session 24. Dec 13 14:25:45.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.77:22-139.178.68.195:60116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:45.056428 kernel: audit: type=1104 audit(1734099945.030:1506): pid=5051 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:25:45.602000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:45.602000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002796e40 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:45.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:45.608000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:45.608000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002758a60 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:45.608000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:45.612000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:45.612000 audit[1894]: AVC avc: denied { watch } for pid=1894 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=527900 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:45.612000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002796e60 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:45.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:45.612000 audit[1894]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002758c00 a2=fc6 a3=0 items=0 ppid=1734 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c408 key=(null) Dec 13 14:25:45.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269