Dec 13 03:37:24.005019 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 03:37:24.005039 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:37:24.005050 kernel: BIOS-provided physical RAM map: Dec 13 03:37:24.005057 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 03:37:24.005063 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 03:37:24.005070 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 03:37:24.005078 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 03:37:24.005085 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 03:37:24.005093 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 03:37:24.005099 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 03:37:24.005106 kernel: NX (Execute Disable) protection: active Dec 13 03:37:24.005112 kernel: SMBIOS 2.8 present. Dec 13 03:37:24.005119 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 03:37:24.005125 kernel: Hypervisor detected: KVM Dec 13 03:37:24.005133 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 03:37:24.005142 kernel: kvm-clock: cpu 0, msr 7d19b001, primary cpu clock Dec 13 03:37:24.005149 kernel: kvm-clock: using sched offset of 5490385594 cycles Dec 13 03:37:24.005157 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 03:37:24.005164 kernel: tsc: Detected 1996.249 MHz processor Dec 13 03:37:24.005172 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 03:37:24.005179 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 03:37:24.005187 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 03:37:24.005194 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 03:37:24.005203 kernel: ACPI: Early table checksum verification disabled Dec 13 03:37:24.005210 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 03:37:24.005217 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:37:24.005225 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:37:24.005232 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:37:24.005239 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 03:37:24.005246 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:37:24.005254 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 03:37:24.005261 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 03:37:24.005269 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 03:37:24.005277 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 03:37:24.005284 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 03:37:24.005291 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 03:37:24.005298 kernel: No NUMA configuration found Dec 13 03:37:24.005305 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 03:37:24.005312 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 03:37:24.005320 kernel: Zone ranges: Dec 13 03:37:24.005331 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 03:37:24.005339 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 03:37:24.005346 kernel: Normal empty Dec 13 03:37:24.005354 kernel: Movable zone start for each node Dec 13 03:37:24.005361 kernel: Early memory node ranges Dec 13 03:37:24.005368 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 03:37:24.005377 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 03:37:24.005385 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 03:37:24.005405 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 03:37:24.005413 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 03:37:24.005420 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 03:37:24.005427 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 03:37:24.005435 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 03:37:24.005442 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 03:37:24.005450 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 03:37:24.005459 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 03:37:24.005467 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 03:37:24.005474 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 03:37:24.005482 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 03:37:24.005489 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 03:37:24.005497 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 03:37:24.005504 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 03:37:24.005512 kernel: Booting paravirtualized kernel on KVM Dec 13 03:37:24.005519 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 03:37:24.005527 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 03:37:24.005536 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 03:37:24.005544 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 03:37:24.005551 kernel: pcpu-alloc: [0] 0 1 Dec 13 03:37:24.005558 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 03:37:24.005566 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 03:37:24.005573 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 03:37:24.005581 kernel: Policy zone: DMA32 Dec 13 03:37:24.005589 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:37:24.005599 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 03:37:24.005606 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 03:37:24.005614 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 03:37:24.005622 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 03:37:24.005630 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123076K reserved, 0K cma-reserved) Dec 13 03:37:24.005637 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 03:37:24.005645 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 03:37:24.005652 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 03:37:24.005661 kernel: rcu: Hierarchical RCU implementation. Dec 13 03:37:24.005669 kernel: rcu: RCU event tracing is enabled. Dec 13 03:37:24.005677 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 03:37:24.005685 kernel: Rude variant of Tasks RCU enabled. Dec 13 03:37:24.005693 kernel: Tracing variant of Tasks RCU enabled. Dec 13 03:37:24.005700 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 03:37:24.005708 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 03:37:24.005715 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 03:37:24.007790 kernel: Console: colour VGA+ 80x25 Dec 13 03:37:24.007802 kernel: printk: console [tty0] enabled Dec 13 03:37:24.007810 kernel: printk: console [ttyS0] enabled Dec 13 03:37:24.007817 kernel: ACPI: Core revision 20210730 Dec 13 03:37:24.007825 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 03:37:24.007832 kernel: x2apic enabled Dec 13 03:37:24.007840 kernel: Switched APIC routing to physical x2apic. Dec 13 03:37:24.007847 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 03:37:24.007855 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 03:37:24.007862 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 03:37:24.007870 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 03:37:24.007879 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 03:37:24.007887 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 03:37:24.007894 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 03:37:24.007902 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 03:37:24.007909 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 03:37:24.007917 kernel: Speculative Store Bypass: Vulnerable Dec 13 03:37:24.007924 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 03:37:24.007932 kernel: Freeing SMP alternatives memory: 32K Dec 13 03:37:24.007939 kernel: pid_max: default: 32768 minimum: 301 Dec 13 03:37:24.007948 kernel: LSM: Security Framework initializing Dec 13 03:37:24.007956 kernel: SELinux: Initializing. Dec 13 03:37:24.007963 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 03:37:24.007971 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 03:37:24.007979 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 03:37:24.007986 kernel: Performance Events: AMD PMU driver. Dec 13 03:37:24.007994 kernel: ... version: 0 Dec 13 03:37:24.008001 kernel: ... bit width: 48 Dec 13 03:37:24.008009 kernel: ... generic registers: 4 Dec 13 03:37:24.008023 kernel: ... value mask: 0000ffffffffffff Dec 13 03:37:24.008031 kernel: ... max period: 00007fffffffffff Dec 13 03:37:24.008040 kernel: ... fixed-purpose events: 0 Dec 13 03:37:24.008048 kernel: ... event mask: 000000000000000f Dec 13 03:37:24.008055 kernel: signal: max sigframe size: 1440 Dec 13 03:37:24.008063 kernel: rcu: Hierarchical SRCU implementation. Dec 13 03:37:24.008071 kernel: smp: Bringing up secondary CPUs ... Dec 13 03:37:24.008079 kernel: x86: Booting SMP configuration: Dec 13 03:37:24.008088 kernel: .... node #0, CPUs: #1 Dec 13 03:37:24.008096 kernel: kvm-clock: cpu 1, msr 7d19b041, secondary cpu clock Dec 13 03:37:24.008106 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 03:37:24.008114 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 03:37:24.008123 kernel: smpboot: Max logical packages: 2 Dec 13 03:37:24.008131 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 03:37:24.008140 kernel: devtmpfs: initialized Dec 13 03:37:24.008148 kernel: x86/mm: Memory block size: 128MB Dec 13 03:37:24.008156 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 03:37:24.008167 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 03:37:24.008175 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 03:37:24.008184 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 03:37:24.008192 kernel: audit: initializing netlink subsys (disabled) Dec 13 03:37:24.008201 kernel: audit: type=2000 audit(1734061043.315:1): state=initialized audit_enabled=0 res=1 Dec 13 03:37:24.008209 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 03:37:24.008217 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 03:37:24.008226 kernel: cpuidle: using governor menu Dec 13 03:37:24.008234 kernel: ACPI: bus type PCI registered Dec 13 03:37:24.008244 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 03:37:24.008253 kernel: dca service started, version 1.12.1 Dec 13 03:37:24.008261 kernel: PCI: Using configuration type 1 for base access Dec 13 03:37:24.008270 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 03:37:24.008278 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 03:37:24.008287 kernel: ACPI: Added _OSI(Module Device) Dec 13 03:37:24.008295 kernel: ACPI: Added _OSI(Processor Device) Dec 13 03:37:24.008303 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 03:37:24.008312 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 03:37:24.008322 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 03:37:24.008330 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 03:37:24.008339 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 03:37:24.008347 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 03:37:24.008356 kernel: ACPI: Interpreter enabled Dec 13 03:37:24.008364 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 03:37:24.008372 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 03:37:24.008381 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 03:37:24.008389 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 03:37:24.008399 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 03:37:24.008537 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 03:37:24.008628 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 03:37:24.008642 kernel: acpiphp: Slot [3] registered Dec 13 03:37:24.008651 kernel: acpiphp: Slot [4] registered Dec 13 03:37:24.008659 kernel: acpiphp: Slot [5] registered Dec 13 03:37:24.008668 kernel: acpiphp: Slot [6] registered Dec 13 03:37:24.008679 kernel: acpiphp: Slot [7] registered Dec 13 03:37:24.008687 kernel: acpiphp: Slot [8] registered Dec 13 03:37:24.008696 kernel: acpiphp: Slot [9] registered Dec 13 03:37:24.008704 kernel: acpiphp: Slot [10] registered Dec 13 03:37:24.008712 kernel: acpiphp: Slot [11] registered Dec 13 03:37:24.008743 kernel: acpiphp: Slot [12] registered Dec 13 03:37:24.008752 kernel: acpiphp: Slot [13] registered Dec 13 03:37:24.008760 kernel: acpiphp: Slot [14] registered Dec 13 03:37:24.008768 kernel: acpiphp: Slot [15] registered Dec 13 03:37:24.008777 kernel: acpiphp: Slot [16] registered Dec 13 03:37:24.008787 kernel: acpiphp: Slot [17] registered Dec 13 03:37:24.008796 kernel: acpiphp: Slot [18] registered Dec 13 03:37:24.008804 kernel: acpiphp: Slot [19] registered Dec 13 03:37:24.008812 kernel: acpiphp: Slot [20] registered Dec 13 03:37:24.008821 kernel: acpiphp: Slot [21] registered Dec 13 03:37:24.008829 kernel: acpiphp: Slot [22] registered Dec 13 03:37:24.008837 kernel: acpiphp: Slot [23] registered Dec 13 03:37:24.008846 kernel: acpiphp: Slot [24] registered Dec 13 03:37:24.008854 kernel: acpiphp: Slot [25] registered Dec 13 03:37:24.008864 kernel: acpiphp: Slot [26] registered Dec 13 03:37:24.008872 kernel: acpiphp: Slot [27] registered Dec 13 03:37:24.008880 kernel: acpiphp: Slot [28] registered Dec 13 03:37:24.008889 kernel: acpiphp: Slot [29] registered Dec 13 03:37:24.008897 kernel: acpiphp: Slot [30] registered Dec 13 03:37:24.008905 kernel: acpiphp: Slot [31] registered Dec 13 03:37:24.008913 kernel: PCI host bridge to bus 0000:00 Dec 13 03:37:24.009017 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 03:37:24.009098 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 03:37:24.009181 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 03:37:24.009257 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 03:37:24.009342 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 03:37:24.009441 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 03:37:24.009547 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 03:37:24.009645 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 03:37:24.010756 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 03:37:24.010850 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 03:37:24.010933 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 03:37:24.011016 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 03:37:24.011098 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 03:37:24.011178 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 03:37:24.011266 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 03:37:24.011354 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 03:37:24.011438 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 03:37:24.011528 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 03:37:24.011611 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 03:37:24.011694 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 03:37:24.011796 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 03:37:24.011882 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 03:37:24.011966 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 03:37:24.012054 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 03:37:24.012138 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 03:37:24.012221 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 03:37:24.012301 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 03:37:24.012382 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 03:37:24.012473 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 03:37:24.012557 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 03:37:24.012638 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 03:37:24.012733 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 03:37:24.014853 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 03:37:24.014939 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 03:37:24.015019 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 03:37:24.015111 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 03:37:24.015192 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 03:37:24.015272 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 03:37:24.015284 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 03:37:24.015292 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 03:37:24.015300 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 03:37:24.015308 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 03:37:24.015317 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 03:37:24.015328 kernel: iommu: Default domain type: Translated Dec 13 03:37:24.015336 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 03:37:24.015415 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 03:37:24.015495 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 03:37:24.015575 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 03:37:24.015587 kernel: vgaarb: loaded Dec 13 03:37:24.015595 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 03:37:24.015604 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 03:37:24.015612 kernel: PTP clock support registered Dec 13 03:37:24.015623 kernel: PCI: Using ACPI for IRQ routing Dec 13 03:37:24.015630 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 03:37:24.015639 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 03:37:24.015646 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 03:37:24.015654 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 03:37:24.015662 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 03:37:24.015670 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 03:37:24.015678 kernel: pnp: PnP ACPI init Dec 13 03:37:24.016810 kernel: pnp 00:03: [dma 2] Dec 13 03:37:24.016829 kernel: pnp: PnP ACPI: found 5 devices Dec 13 03:37:24.016837 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 03:37:24.016845 kernel: NET: Registered PF_INET protocol family Dec 13 03:37:24.016853 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 03:37:24.016862 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 03:37:24.016870 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 03:37:24.016878 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 03:37:24.016887 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 03:37:24.016896 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 03:37:24.016904 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 03:37:24.016912 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 03:37:24.016920 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 03:37:24.016928 kernel: NET: Registered PF_XDP protocol family Dec 13 03:37:24.017002 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 03:37:24.017077 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 03:37:24.017147 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 03:37:24.017217 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 03:37:24.017290 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 03:37:24.017371 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 03:37:24.017469 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 03:37:24.017550 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 03:37:24.017562 kernel: PCI: CLS 0 bytes, default 64 Dec 13 03:37:24.017570 kernel: Initialise system trusted keyrings Dec 13 03:37:24.017578 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 03:37:24.017589 kernel: Key type asymmetric registered Dec 13 03:37:24.017597 kernel: Asymmetric key parser 'x509' registered Dec 13 03:37:24.017605 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 03:37:24.017613 kernel: io scheduler mq-deadline registered Dec 13 03:37:24.017621 kernel: io scheduler kyber registered Dec 13 03:37:24.017629 kernel: io scheduler bfq registered Dec 13 03:37:24.017637 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 03:37:24.017645 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 03:37:24.017653 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 03:37:24.017661 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 03:37:24.017671 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 03:37:24.017679 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 03:37:24.017687 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 03:37:24.017695 kernel: random: crng init done Dec 13 03:37:24.017703 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 03:37:24.017711 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 03:37:24.021743 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 03:37:24.021850 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 03:37:24.021868 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 03:37:24.021948 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 03:37:24.022026 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T03:37:23 UTC (1734061043) Dec 13 03:37:24.022104 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 03:37:24.022117 kernel: NET: Registered PF_INET6 protocol family Dec 13 03:37:24.022125 kernel: Segment Routing with IPv6 Dec 13 03:37:24.022134 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 03:37:24.022142 kernel: NET: Registered PF_PACKET protocol family Dec 13 03:37:24.022151 kernel: Key type dns_resolver registered Dec 13 03:37:24.022162 kernel: IPI shorthand broadcast: enabled Dec 13 03:37:24.022170 kernel: sched_clock: Marking stable (738402668, 119077397)->(885769891, -28289826) Dec 13 03:37:24.022179 kernel: registered taskstats version 1 Dec 13 03:37:24.022187 kernel: Loading compiled-in X.509 certificates Dec 13 03:37:24.022196 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 03:37:24.022205 kernel: Key type .fscrypt registered Dec 13 03:37:24.022213 kernel: Key type fscrypt-provisioning registered Dec 13 03:37:24.022222 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 03:37:24.022232 kernel: ima: Allocated hash algorithm: sha1 Dec 13 03:37:24.022240 kernel: ima: No architecture policies found Dec 13 03:37:24.022249 kernel: clk: Disabling unused clocks Dec 13 03:37:24.022257 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 03:37:24.022266 kernel: Write protecting the kernel read-only data: 28672k Dec 13 03:37:24.022274 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 03:37:24.022283 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 03:37:24.022291 kernel: Run /init as init process Dec 13 03:37:24.022300 kernel: with arguments: Dec 13 03:37:24.022309 kernel: /init Dec 13 03:37:24.022318 kernel: with environment: Dec 13 03:37:24.022326 kernel: HOME=/ Dec 13 03:37:24.022334 kernel: TERM=linux Dec 13 03:37:24.022342 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 03:37:24.022354 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:37:24.022365 systemd[1]: Detected virtualization kvm. Dec 13 03:37:24.022375 systemd[1]: Detected architecture x86-64. Dec 13 03:37:24.022386 systemd[1]: Running in initrd. Dec 13 03:37:24.022395 systemd[1]: No hostname configured, using default hostname. Dec 13 03:37:24.022404 systemd[1]: Hostname set to . Dec 13 03:37:24.022414 systemd[1]: Initializing machine ID from VM UUID. Dec 13 03:37:24.022423 systemd[1]: Queued start job for default target initrd.target. Dec 13 03:37:24.022432 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:37:24.022441 systemd[1]: Reached target cryptsetup.target. Dec 13 03:37:24.022450 systemd[1]: Reached target paths.target. Dec 13 03:37:24.022460 systemd[1]: Reached target slices.target. Dec 13 03:37:24.022469 systemd[1]: Reached target swap.target. Dec 13 03:37:24.022479 systemd[1]: Reached target timers.target. Dec 13 03:37:24.022488 systemd[1]: Listening on iscsid.socket. Dec 13 03:37:24.022497 systemd[1]: Listening on iscsiuio.socket. Dec 13 03:37:24.022506 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 03:37:24.022516 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 03:37:24.022525 systemd[1]: Listening on systemd-journald.socket. Dec 13 03:37:24.022535 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:37:24.022545 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:37:24.022554 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:37:24.022563 systemd[1]: Reached target sockets.target. Dec 13 03:37:24.022580 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:37:24.022591 systemd[1]: Finished network-cleanup.service. Dec 13 03:37:24.022609 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 03:37:24.022618 systemd[1]: Starting systemd-journald.service... Dec 13 03:37:24.022628 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:37:24.022637 systemd[1]: Starting systemd-resolved.service... Dec 13 03:37:24.022646 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 03:37:24.022656 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:37:24.022665 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 03:37:24.022679 systemd-journald[185]: Journal started Dec 13 03:37:24.022742 systemd-journald[185]: Runtime Journal (/run/log/journal/39a51881da994a12840b60edbf64e156) is 4.9M, max 39.5M, 34.5M free. Dec 13 03:37:24.030075 systemd[1]: Started systemd-journald.service. Dec 13 03:37:24.030102 kernel: audit: type=1130 audit(1734061044.024:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.030911 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:37:24.034799 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 03:37:24.041781 kernel: audit: type=1130 audit(1734061044.026:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.042545 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:37:24.044225 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 03:37:24.046008 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 03:37:24.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.053833 kernel: audit: type=1130 audit(1734061044.042:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.053862 kernel: audit: type=1130 audit(1734061044.044:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.054527 systemd-resolved[187]: Positive Trust Anchors: Dec 13 03:37:24.054551 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:37:24.054591 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:37:24.057336 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 03:37:24.063860 systemd[1]: Started systemd-resolved.service. Dec 13 03:37:24.064325 systemd[1]: Reached target nss-lookup.target. Dec 13 03:37:24.073746 kernel: audit: type=1130 audit(1734061044.063:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.075059 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 03:37:24.076294 systemd[1]: Starting dracut-cmdline.service... Dec 13 03:37:24.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.081901 kernel: audit: type=1130 audit(1734061044.074:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.089694 dracut-cmdline[201]: dracut-dracut-053 Dec 13 03:37:24.092380 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 03:37:24.096638 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 03:37:24.102517 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 03:37:24.103093 kernel: Bridge firewalling registered Dec 13 03:37:24.128761 kernel: SCSI subsystem initialized Dec 13 03:37:24.145420 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 03:37:24.145469 kernel: device-mapper: uevent: version 1.0.3 Dec 13 03:37:24.147748 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 03:37:24.152013 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 03:37:24.152957 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:37:24.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.157672 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:37:24.159310 kernel: audit: type=1130 audit(1734061044.152:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.165380 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:37:24.169750 kernel: audit: type=1130 audit(1734061044.165:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.171760 kernel: Loading iSCSI transport class v2.0-870. Dec 13 03:37:24.191746 kernel: iscsi: registered transport (tcp) Dec 13 03:37:24.219104 kernel: iscsi: registered transport (qla4xxx) Dec 13 03:37:24.219150 kernel: QLogic iSCSI HBA Driver Dec 13 03:37:24.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.257752 kernel: audit: type=1130 audit(1734061044.253:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.253829 systemd[1]: Finished dracut-cmdline.service. Dec 13 03:37:24.255213 systemd[1]: Starting dracut-pre-udev.service... Dec 13 03:37:24.310857 kernel: raid6: sse2x4 gen() 12937 MB/s Dec 13 03:37:24.327818 kernel: raid6: sse2x4 xor() 4965 MB/s Dec 13 03:37:24.344896 kernel: raid6: sse2x2 gen() 13787 MB/s Dec 13 03:37:24.361822 kernel: raid6: sse2x2 xor() 8386 MB/s Dec 13 03:37:24.378817 kernel: raid6: sse2x1 gen() 10757 MB/s Dec 13 03:37:24.396506 kernel: raid6: sse2x1 xor() 6831 MB/s Dec 13 03:37:24.396574 kernel: raid6: using algorithm sse2x2 gen() 13787 MB/s Dec 13 03:37:24.396602 kernel: raid6: .... xor() 8386 MB/s, rmw enabled Dec 13 03:37:24.397324 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 03:37:24.412797 kernel: xor: measuring software checksum speed Dec 13 03:37:24.412862 kernel: prefetch64-sse : 18337 MB/sec Dec 13 03:37:24.414873 kernel: generic_sse : 15274 MB/sec Dec 13 03:37:24.414923 kernel: xor: using function: prefetch64-sse (18337 MB/sec) Dec 13 03:37:24.528794 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 03:37:24.544916 systemd[1]: Finished dracut-pre-udev.service. Dec 13 03:37:24.546644 systemd[1]: Starting systemd-udevd.service... Dec 13 03:37:24.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.545000 audit: BPF prog-id=7 op=LOAD Dec 13 03:37:24.545000 audit: BPF prog-id=8 op=LOAD Dec 13 03:37:24.560591 systemd-udevd[386]: Using default interface naming scheme 'v252'. Dec 13 03:37:24.565479 systemd[1]: Started systemd-udevd.service. Dec 13 03:37:24.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.576878 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 03:37:24.597108 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 03:37:24.651880 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 03:37:24.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.654958 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:37:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:24.719274 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:37:24.789745 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 03:37:24.804074 kernel: libata version 3.00 loaded. Dec 13 03:37:24.804093 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 03:37:24.804104 kernel: GPT:17805311 != 41943039 Dec 13 03:37:24.804114 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 03:37:24.804124 kernel: GPT:17805311 != 41943039 Dec 13 03:37:24.804134 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 03:37:24.804144 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:37:24.804155 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 03:37:24.840983 kernel: scsi host0: ata_piix Dec 13 03:37:24.841124 kernel: scsi host1: ata_piix Dec 13 03:37:24.841229 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 03:37:24.841242 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 03:37:24.844739 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (433) Dec 13 03:37:24.855318 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 03:37:24.888079 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:37:24.891328 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 03:37:24.891874 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 03:37:24.897455 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 03:37:24.898894 systemd[1]: Starting disk-uuid.service... Dec 13 03:37:24.916031 disk-uuid[462]: Primary Header is updated. Dec 13 03:37:24.916031 disk-uuid[462]: Secondary Entries is updated. Dec 13 03:37:24.916031 disk-uuid[462]: Secondary Header is updated. Dec 13 03:37:24.923774 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:37:24.928783 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:37:25.948646 disk-uuid[463]: The operation has completed successfully. Dec 13 03:37:25.950486 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 03:37:26.012066 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 03:37:26.013127 systemd[1]: Finished disk-uuid.service. Dec 13 03:37:26.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.032444 systemd[1]: Starting verity-setup.service... Dec 13 03:37:26.068786 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 03:37:26.170425 systemd[1]: Found device dev-mapper-usr.device. Dec 13 03:37:26.176112 systemd[1]: Mounting sysusr-usr.mount... Dec 13 03:37:26.180298 systemd[1]: Finished verity-setup.service. Dec 13 03:37:26.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.326796 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 03:37:26.327529 systemd[1]: Mounted sysusr-usr.mount. Dec 13 03:37:26.328250 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 03:37:26.329557 systemd[1]: Starting ignition-setup.service... Dec 13 03:37:26.336508 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 03:37:26.351594 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:37:26.351689 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:37:26.351718 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:37:26.372294 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 03:37:26.397056 systemd[1]: Finished ignition-setup.service. Dec 13 03:37:26.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.398515 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 03:37:26.490311 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 03:37:26.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.490000 audit: BPF prog-id=9 op=LOAD Dec 13 03:37:26.492366 systemd[1]: Starting systemd-networkd.service... Dec 13 03:37:26.515962 systemd-networkd[633]: lo: Link UP Dec 13 03:37:26.515975 systemd-networkd[633]: lo: Gained carrier Dec 13 03:37:26.516472 systemd-networkd[633]: Enumeration completed Dec 13 03:37:26.516705 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:37:26.517993 systemd-networkd[633]: eth0: Link UP Dec 13 03:37:26.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.517998 systemd-networkd[633]: eth0: Gained carrier Dec 13 03:37:26.519324 systemd[1]: Started systemd-networkd.service. Dec 13 03:37:26.520792 systemd[1]: Reached target network.target. Dec 13 03:37:26.522667 systemd[1]: Starting iscsiuio.service... Dec 13 03:37:26.530356 systemd[1]: Started iscsiuio.service. Dec 13 03:37:26.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.531787 systemd[1]: Starting iscsid.service... Dec 13 03:37:26.532372 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.167/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 03:37:26.535620 iscsid[642]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:37:26.535620 iscsid[642]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 03:37:26.535620 iscsid[642]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 03:37:26.535620 iscsid[642]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 03:37:26.535620 iscsid[642]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 03:37:26.535620 iscsid[642]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 03:37:26.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.538388 systemd[1]: Started iscsid.service. Dec 13 03:37:26.540188 systemd[1]: Starting dracut-initqueue.service... Dec 13 03:37:26.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.556666 systemd[1]: Finished dracut-initqueue.service. Dec 13 03:37:26.557244 systemd[1]: Reached target remote-fs-pre.target. Dec 13 03:37:26.557702 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:37:26.558179 systemd[1]: Reached target remote-fs.target. Dec 13 03:37:26.559539 systemd[1]: Starting dracut-pre-mount.service... Dec 13 03:37:26.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.569158 systemd[1]: Finished dracut-pre-mount.service. Dec 13 03:37:26.740718 ignition[561]: Ignition 2.14.0 Dec 13 03:37:26.741868 ignition[561]: Stage: fetch-offline Dec 13 03:37:26.742047 ignition[561]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:26.742115 ignition[561]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:26.743837 ignition[561]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:26.743979 ignition[561]: parsed url from cmdline: "" Dec 13 03:37:26.745758 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 03:37:26.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:26.743986 ignition[561]: no config URL provided Dec 13 03:37:26.749421 systemd[1]: Starting ignition-fetch.service... Dec 13 03:37:26.743993 ignition[561]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:37:26.744005 ignition[561]: no config at "/usr/lib/ignition/user.ign" Dec 13 03:37:26.744018 ignition[561]: failed to fetch config: resource requires networking Dec 13 03:37:26.744392 ignition[561]: Ignition finished successfully Dec 13 03:37:26.761253 ignition[657]: Ignition 2.14.0 Dec 13 03:37:26.761271 ignition[657]: Stage: fetch Dec 13 03:37:26.761460 ignition[657]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:26.761495 ignition[657]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:26.763004 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:26.763160 ignition[657]: parsed url from cmdline: "" Dec 13 03:37:26.763165 ignition[657]: no config URL provided Dec 13 03:37:26.763174 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 03:37:26.763186 ignition[657]: no config at "/usr/lib/ignition/user.ign" Dec 13 03:37:26.765241 ignition[657]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 03:37:26.768157 ignition[657]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 03:37:26.769596 ignition[657]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 03:37:27.123629 ignition[657]: GET result: OK Dec 13 03:37:27.123918 ignition[657]: parsing config with SHA512: 2c21f70ad2d7bd890dbab06f12840ffbafa2781ac429152f7398c37607b7d86d39b617b5cee24f7953038f527d9f482751f828be395feadb15bd8bf783fda49c Dec 13 03:37:27.139358 unknown[657]: fetched base config from "system" Dec 13 03:37:27.139412 unknown[657]: fetched base config from "system" Dec 13 03:37:27.139439 unknown[657]: fetched user config from "openstack" Dec 13 03:37:27.140679 ignition[657]: fetch: fetch complete Dec 13 03:37:27.140693 ignition[657]: fetch: fetch passed Dec 13 03:37:27.140819 ignition[657]: Ignition finished successfully Dec 13 03:37:27.143803 systemd[1]: Finished ignition-fetch.service. Dec 13 03:37:27.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.147027 systemd[1]: Starting ignition-kargs.service... Dec 13 03:37:27.162431 ignition[663]: Ignition 2.14.0 Dec 13 03:37:27.162456 ignition[663]: Stage: kargs Dec 13 03:37:27.162684 ignition[663]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:27.162787 ignition[663]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:27.164708 ignition[663]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:27.167212 ignition[663]: kargs: kargs passed Dec 13 03:37:27.167300 ignition[663]: Ignition finished successfully Dec 13 03:37:27.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.169648 systemd[1]: Finished ignition-kargs.service. Dec 13 03:37:27.181980 systemd[1]: Starting ignition-disks.service... Dec 13 03:37:27.200122 ignition[669]: Ignition 2.14.0 Dec 13 03:37:27.200150 ignition[669]: Stage: disks Dec 13 03:37:27.200397 ignition[669]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:27.200441 ignition[669]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:27.202825 ignition[669]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:27.205483 ignition[669]: disks: disks passed Dec 13 03:37:27.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.207181 systemd[1]: Finished ignition-disks.service. Dec 13 03:37:27.205580 ignition[669]: Ignition finished successfully Dec 13 03:37:27.208526 systemd[1]: Reached target initrd-root-device.target. Dec 13 03:37:27.209677 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:37:27.211849 systemd[1]: Reached target local-fs.target. Dec 13 03:37:27.214000 systemd[1]: Reached target sysinit.target. Dec 13 03:37:27.216143 systemd[1]: Reached target basic.target. Dec 13 03:37:27.219969 systemd[1]: Starting systemd-fsck-root.service... Dec 13 03:37:27.252761 systemd-fsck[676]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 03:37:27.266208 systemd[1]: Finished systemd-fsck-root.service. Dec 13 03:37:27.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.269361 systemd[1]: Mounting sysroot.mount... Dec 13 03:37:27.289784 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 03:37:27.291476 systemd[1]: Mounted sysroot.mount. Dec 13 03:37:27.294029 systemd[1]: Reached target initrd-root-fs.target. Dec 13 03:37:27.298070 systemd[1]: Mounting sysroot-usr.mount... Dec 13 03:37:27.298949 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 03:37:27.299648 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 03:37:27.300237 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 03:37:27.300268 systemd[1]: Reached target ignition-diskful.target. Dec 13 03:37:27.309311 systemd[1]: Mounted sysroot-usr.mount. Dec 13 03:37:27.315023 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:37:27.321133 systemd[1]: Starting initrd-setup-root.service... Dec 13 03:37:27.327740 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (683) Dec 13 03:37:27.335472 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:37:27.335531 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:37:27.335542 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:37:27.343657 initrd-setup-root[704]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 03:37:27.350230 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:37:27.354397 initrd-setup-root[714]: cut: /sysroot/etc/group: No such file or directory Dec 13 03:37:27.360041 initrd-setup-root[722]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 03:37:27.365355 initrd-setup-root[730]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 03:37:27.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.567645 systemd[1]: Finished initrd-setup-root.service. Dec 13 03:37:27.570560 systemd[1]: Starting ignition-mount.service... Dec 13 03:37:27.579030 systemd[1]: Starting sysroot-boot.service... Dec 13 03:37:27.592568 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 03:37:27.592850 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 03:37:27.617764 ignition[751]: INFO : Ignition 2.14.0 Dec 13 03:37:27.618545 ignition[751]: INFO : Stage: mount Dec 13 03:37:27.619152 ignition[751]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:27.619887 ignition[751]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:27.621870 ignition[751]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:27.625932 ignition[751]: INFO : mount: mount passed Dec 13 03:37:27.626511 ignition[751]: INFO : Ignition finished successfully Dec 13 03:37:27.627760 systemd[1]: Finished ignition-mount.service. Dec 13 03:37:27.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.634244 systemd[1]: Finished sysroot-boot.service. Dec 13 03:37:27.647414 coreos-metadata[682]: Dec 13 03:37:27.647 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 03:37:27.667904 coreos-metadata[682]: Dec 13 03:37:27.667 INFO Fetch successful Dec 13 03:37:27.667904 coreos-metadata[682]: Dec 13 03:37:27.667 INFO wrote hostname ci-3510-3-6-5-2a90ac038f.novalocal to /sysroot/etc/hostname Dec 13 03:37:27.671752 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 03:37:27.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:27.671851 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 03:37:27.673048 systemd[1]: Starting ignition-files.service... Dec 13 03:37:27.682650 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 03:37:27.696778 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Dec 13 03:37:27.702747 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 03:37:27.702778 kernel: BTRFS info (device vda6): using free space tree Dec 13 03:37:27.702790 kernel: BTRFS info (device vda6): has skinny extents Dec 13 03:37:27.714714 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 03:37:27.731622 ignition[778]: INFO : Ignition 2.14.0 Dec 13 03:37:27.731622 ignition[778]: INFO : Stage: files Dec 13 03:37:27.734326 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:27.734326 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:27.734326 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:27.740957 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Dec 13 03:37:27.740957 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 03:37:27.740957 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 03:37:27.746419 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 03:37:27.746419 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 03:37:27.746419 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 03:37:27.745533 unknown[778]: wrote ssh authorized keys file for user: core Dec 13 03:37:27.753266 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 03:37:27.753266 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 03:37:27.820645 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 03:37:28.140058 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 03:37:28.140058 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:37:28.145134 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:37:28.175086 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 03:37:28.154983 systemd-networkd[633]: eth0: Gained IPv6LL Dec 13 03:37:28.691231 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 03:37:30.461511 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 03:37:30.462853 ignition[778]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:37:30.463564 ignition[778]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 03:37:30.464299 ignition[778]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 03:37:30.465591 ignition[778]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 03:37:30.466820 ignition[778]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 03:37:30.466820 ignition[778]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 03:37:30.468398 ignition[778]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:37:30.468398 ignition[778]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 03:37:30.468398 ignition[778]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 03:37:30.468398 ignition[778]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 03:37:30.479606 ignition[778]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:37:30.480688 ignition[778]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 03:37:30.480688 ignition[778]: INFO : files: files passed Dec 13 03:37:30.480688 ignition[778]: INFO : Ignition finished successfully Dec 13 03:37:30.482426 systemd[1]: Finished ignition-files.service. Dec 13 03:37:30.490484 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 03:37:30.490504 kernel: audit: type=1130 audit(1734061050.485:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.490284 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 03:37:30.491760 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 03:37:30.493215 systemd[1]: Starting ignition-quench.service... Dec 13 03:37:30.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.501150 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 03:37:30.523081 kernel: audit: type=1130 audit(1734061050.500:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.523132 kernel: audit: type=1131 audit(1734061050.500:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.523162 kernel: audit: type=1130 audit(1734061050.512:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.501241 systemd[1]: Finished ignition-quench.service. Dec 13 03:37:30.527881 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 03:37:30.508916 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 03:37:30.513456 systemd[1]: Reached target ignition-complete.target. Dec 13 03:37:30.524211 systemd[1]: Starting initrd-parse-etc.service... Dec 13 03:37:30.548493 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 03:37:30.549177 systemd[1]: Finished initrd-parse-etc.service. Dec 13 03:37:30.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.551068 systemd[1]: Reached target initrd-fs.target. Dec 13 03:37:30.562385 kernel: audit: type=1130 audit(1734061050.549:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.562432 kernel: audit: type=1131 audit(1734061050.550:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.563580 systemd[1]: Reached target initrd.target. Dec 13 03:37:30.565254 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 03:37:30.565983 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 03:37:30.581114 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 03:37:30.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.583919 systemd[1]: Starting initrd-cleanup.service... Dec 13 03:37:30.587614 kernel: audit: type=1130 audit(1734061050.581:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.598152 systemd[1]: Stopped target nss-lookup.target. Dec 13 03:37:30.599166 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 03:37:30.600217 systemd[1]: Stopped target timers.target. Dec 13 03:37:30.601190 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 03:37:30.601854 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 03:37:30.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.606401 systemd[1]: Stopped target initrd.target. Dec 13 03:37:30.607335 kernel: audit: type=1131 audit(1734061050.602:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.606986 systemd[1]: Stopped target basic.target. Dec 13 03:37:30.607793 systemd[1]: Stopped target ignition-complete.target. Dec 13 03:37:30.608581 systemd[1]: Stopped target ignition-diskful.target. Dec 13 03:37:30.609441 systemd[1]: Stopped target initrd-root-device.target. Dec 13 03:37:30.610327 systemd[1]: Stopped target remote-fs.target. Dec 13 03:37:30.611147 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 03:37:30.611969 systemd[1]: Stopped target sysinit.target. Dec 13 03:37:30.612779 systemd[1]: Stopped target local-fs.target. Dec 13 03:37:30.613562 systemd[1]: Stopped target local-fs-pre.target. Dec 13 03:37:30.614437 systemd[1]: Stopped target swap.target. Dec 13 03:37:30.615246 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 03:37:30.619794 kernel: audit: type=1131 audit(1734061050.615:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.615360 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 03:37:30.616214 systemd[1]: Stopped target cryptsetup.target. Dec 13 03:37:30.624769 kernel: audit: type=1131 audit(1734061050.620:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.620261 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 03:37:30.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.620409 systemd[1]: Stopped dracut-initqueue.service. Dec 13 03:37:30.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.621214 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 03:37:30.621358 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 03:37:30.625341 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 03:37:30.625491 systemd[1]: Stopped ignition-files.service. Dec 13 03:37:30.626983 systemd[1]: Stopping ignition-mount.service... Dec 13 03:37:30.628485 systemd[1]: Stopping iscsiuio.service... Dec 13 03:37:30.636741 ignition[816]: INFO : Ignition 2.14.0 Dec 13 03:37:30.636741 ignition[816]: INFO : Stage: umount Dec 13 03:37:30.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.638008 systemd[1]: Stopping sysroot-boot.service... Dec 13 03:37:30.642004 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 03:37:30.642004 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 03:37:30.642004 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 03:37:30.642004 ignition[816]: INFO : umount: umount passed Dec 13 03:37:30.642004 ignition[816]: INFO : Ignition finished successfully Dec 13 03:37:30.638486 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 03:37:30.638653 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 03:37:30.639372 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 03:37:30.639520 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 03:37:30.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.649157 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 03:37:30.649244 systemd[1]: Stopped iscsiuio.service. Dec 13 03:37:30.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.649983 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 03:37:30.650054 systemd[1]: Stopped ignition-mount.service. Dec 13 03:37:30.651582 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 03:37:30.651654 systemd[1]: Finished initrd-cleanup.service. Dec 13 03:37:30.652945 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 03:37:30.652983 systemd[1]: Stopped ignition-disks.service. Dec 13 03:37:30.653421 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 03:37:30.653455 systemd[1]: Stopped ignition-kargs.service. Dec 13 03:37:30.653923 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 03:37:30.653956 systemd[1]: Stopped ignition-fetch.service. Dec 13 03:37:30.654376 systemd[1]: Stopped target network.target. Dec 13 03:37:30.657805 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 03:37:30.657869 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 03:37:30.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.659395 systemd[1]: Stopped target paths.target. Dec 13 03:37:30.660275 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 03:37:30.663780 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 03:37:30.664391 systemd[1]: Stopped target slices.target. Dec 13 03:37:30.665233 systemd[1]: Stopped target sockets.target. Dec 13 03:37:30.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.666159 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 03:37:30.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.666191 systemd[1]: Closed iscsid.socket. Dec 13 03:37:30.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.666946 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 03:37:30.666975 systemd[1]: Closed iscsiuio.socket. Dec 13 03:37:30.667711 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 03:37:30.667772 systemd[1]: Stopped ignition-setup.service. Dec 13 03:37:30.668831 systemd[1]: Stopping systemd-networkd.service... Dec 13 03:37:30.669936 systemd[1]: Stopping systemd-resolved.service... Dec 13 03:37:30.671542 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 03:37:30.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.671996 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 03:37:30.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.672072 systemd[1]: Stopped sysroot-boot.service. Dec 13 03:37:30.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.672624 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 03:37:30.672660 systemd[1]: Stopped initrd-setup-root.service. Dec 13 03:37:30.672754 systemd-networkd[633]: eth0: DHCPv6 lease lost Dec 13 03:37:30.687000 audit: BPF prog-id=9 op=UNLOAD Dec 13 03:37:30.674493 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 03:37:30.674573 systemd[1]: Stopped systemd-networkd.service. Dec 13 03:37:30.676424 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 03:37:30.676457 systemd[1]: Closed systemd-networkd.socket. Dec 13 03:37:30.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.679034 systemd[1]: Stopping network-cleanup.service... Dec 13 03:37:30.679589 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 03:37:30.679637 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 03:37:30.682100 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 03:37:30.682141 systemd[1]: Stopped systemd-sysctl.service. Dec 13 03:37:30.694000 audit: BPF prog-id=6 op=UNLOAD Dec 13 03:37:30.683353 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 03:37:30.683392 systemd[1]: Stopped systemd-modules-load.service. Dec 13 03:37:30.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.685967 systemd[1]: Stopping systemd-udevd.service... Dec 13 03:37:30.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.689638 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 03:37:30.690126 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 03:37:30.690215 systemd[1]: Stopped systemd-resolved.service. Dec 13 03:37:30.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.694983 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 03:37:30.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.695494 systemd[1]: Stopped network-cleanup.service. Dec 13 03:37:30.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.696428 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 03:37:30.696553 systemd[1]: Stopped systemd-udevd.service. Dec 13 03:37:30.697957 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 03:37:30.697998 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 03:37:30.698476 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 03:37:30.698502 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 03:37:30.699516 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 03:37:30.699562 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 03:37:30.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.700450 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 03:37:30.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.700485 systemd[1]: Stopped dracut-cmdline.service. Dec 13 03:37:30.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.701321 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 03:37:30.701355 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 03:37:30.702840 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 03:37:30.703593 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 03:37:30.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:30.703634 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 03:37:30.710469 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 03:37:30.710520 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 03:37:30.711103 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 03:37:30.711139 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 03:37:30.712957 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 03:37:30.713390 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 03:37:30.713470 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 03:37:30.714495 systemd[1]: Reached target initrd-switch-root.target. Dec 13 03:37:30.716244 systemd[1]: Starting initrd-switch-root.service... Dec 13 03:37:30.735243 systemd[1]: Switching root. Dec 13 03:37:30.758336 iscsid[642]: iscsid shutting down. Dec 13 03:37:30.759225 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Dec 13 03:37:30.759300 systemd-journald[185]: Journal stopped Dec 13 03:37:35.448128 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 03:37:35.448176 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 03:37:35.448190 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 03:37:35.448203 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 03:37:35.448217 kernel: SELinux: policy capability open_perms=1 Dec 13 03:37:35.448229 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 03:37:35.448242 kernel: SELinux: policy capability always_check_network=0 Dec 13 03:37:35.448252 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 03:37:35.448263 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 03:37:35.448273 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 03:37:35.448286 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 03:37:35.448298 systemd[1]: Successfully loaded SELinux policy in 88.004ms. Dec 13 03:37:35.448315 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.849ms. Dec 13 03:37:35.448329 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 03:37:35.448342 systemd[1]: Detected virtualization kvm. Dec 13 03:37:35.448353 systemd[1]: Detected architecture x86-64. Dec 13 03:37:35.448365 systemd[1]: Detected first boot. Dec 13 03:37:35.448380 systemd[1]: Hostname set to . Dec 13 03:37:35.448392 systemd[1]: Initializing machine ID from VM UUID. Dec 13 03:37:35.448403 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 03:37:35.448415 systemd[1]: Populated /etc with preset unit settings. Dec 13 03:37:35.448429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:37:35.448441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:37:35.448456 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:37:35.448471 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 03:37:35.448483 systemd[1]: Stopped iscsid.service. Dec 13 03:37:35.448495 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 03:37:35.448508 systemd[1]: Stopped initrd-switch-root.service. Dec 13 03:37:35.448520 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 03:37:35.448533 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 03:37:35.448545 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 03:37:35.448559 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 03:37:35.448571 systemd[1]: Created slice system-getty.slice. Dec 13 03:37:35.448583 systemd[1]: Created slice system-modprobe.slice. Dec 13 03:37:35.448595 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 03:37:35.448607 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 03:37:35.448620 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 03:37:35.448631 systemd[1]: Created slice user.slice. Dec 13 03:37:35.448643 systemd[1]: Started systemd-ask-password-console.path. Dec 13 03:37:35.448655 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 03:37:35.448670 systemd[1]: Set up automount boot.automount. Dec 13 03:37:35.448682 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 03:37:35.448695 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 03:37:35.448707 systemd[1]: Stopped target initrd-fs.target. Dec 13 03:37:35.448734 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 03:37:35.448748 systemd[1]: Reached target integritysetup.target. Dec 13 03:37:35.448762 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 03:37:35.448774 systemd[1]: Reached target remote-fs.target. Dec 13 03:37:35.448786 systemd[1]: Reached target slices.target. Dec 13 03:37:35.448798 systemd[1]: Reached target swap.target. Dec 13 03:37:35.448810 systemd[1]: Reached target torcx.target. Dec 13 03:37:35.448822 systemd[1]: Reached target veritysetup.target. Dec 13 03:37:35.448834 systemd[1]: Listening on systemd-coredump.socket. Dec 13 03:37:35.448847 systemd[1]: Listening on systemd-initctl.socket. Dec 13 03:37:35.448859 systemd[1]: Listening on systemd-networkd.socket. Dec 13 03:37:35.448873 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 03:37:35.448885 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 03:37:35.448897 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 03:37:35.448909 systemd[1]: Mounting dev-hugepages.mount... Dec 13 03:37:35.448921 systemd[1]: Mounting dev-mqueue.mount... Dec 13 03:37:35.448933 systemd[1]: Mounting media.mount... Dec 13 03:37:35.448946 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:35.448958 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 03:37:35.448971 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 03:37:35.448982 systemd[1]: Mounting tmp.mount... Dec 13 03:37:35.448997 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 03:37:35.449009 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:37:35.449021 systemd[1]: Starting kmod-static-nodes.service... Dec 13 03:37:35.449033 systemd[1]: Starting modprobe@configfs.service... Dec 13 03:37:35.449045 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:37:35.449057 systemd[1]: Starting modprobe@drm.service... Dec 13 03:37:35.449069 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:37:35.449081 systemd[1]: Starting modprobe@fuse.service... Dec 13 03:37:35.449093 systemd[1]: Starting modprobe@loop.service... Dec 13 03:37:35.449107 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 03:37:35.449120 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 03:37:35.449132 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 03:37:35.449144 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 03:37:35.449158 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 03:37:35.449170 systemd[1]: Stopped systemd-journald.service. Dec 13 03:37:35.449182 systemd[1]: Starting systemd-journald.service... Dec 13 03:37:35.449194 systemd[1]: Starting systemd-modules-load.service... Dec 13 03:37:35.449206 systemd[1]: Starting systemd-network-generator.service... Dec 13 03:37:35.449220 systemd[1]: Starting systemd-remount-fs.service... Dec 13 03:37:35.449232 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 03:37:35.449244 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 03:37:35.449256 systemd[1]: Stopped verity-setup.service. Dec 13 03:37:35.449268 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:35.449280 systemd[1]: Mounted dev-hugepages.mount. Dec 13 03:37:35.449292 systemd[1]: Mounted dev-mqueue.mount. Dec 13 03:37:35.449304 systemd[1]: Mounted media.mount. Dec 13 03:37:35.449316 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 03:37:35.449329 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 03:37:35.449354 systemd[1]: Mounted tmp.mount. Dec 13 03:37:35.449367 systemd[1]: Finished kmod-static-nodes.service. Dec 13 03:37:35.449380 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 03:37:35.449392 systemd[1]: Finished modprobe@configfs.service. Dec 13 03:37:35.450850 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:37:35.450898 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:37:35.450913 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:37:35.450925 systemd[1]: Finished modprobe@drm.service. Dec 13 03:37:35.450940 systemd-journald[915]: Journal started Dec 13 03:37:35.450990 systemd-journald[915]: Runtime Journal (/run/log/journal/39a51881da994a12840b60edbf64e156) is 4.9M, max 39.5M, 34.5M free. Dec 13 03:37:31.026000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 03:37:31.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:37:31.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 03:37:31.153000 audit: BPF prog-id=10 op=LOAD Dec 13 03:37:31.153000 audit: BPF prog-id=10 op=UNLOAD Dec 13 03:37:31.153000 audit: BPF prog-id=11 op=LOAD Dec 13 03:37:31.153000 audit: BPF prog-id=11 op=UNLOAD Dec 13 03:37:31.310000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 03:37:31.310000 audit[849]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:37:31.310000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:37:31.312000 audit[849]: AVC avc: denied { associate } for pid=849 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 03:37:31.312000 audit[849]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=832 pid=849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:37:31.312000 audit: CWD cwd="/" Dec 13 03:37:31.312000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:31.312000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:31.312000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 03:37:35.256000 audit: BPF prog-id=12 op=LOAD Dec 13 03:37:35.256000 audit: BPF prog-id=3 op=UNLOAD Dec 13 03:37:35.256000 audit: BPF prog-id=13 op=LOAD Dec 13 03:37:35.256000 audit: BPF prog-id=14 op=LOAD Dec 13 03:37:35.256000 audit: BPF prog-id=4 op=UNLOAD Dec 13 03:37:35.256000 audit: BPF prog-id=5 op=UNLOAD Dec 13 03:37:35.258000 audit: BPF prog-id=15 op=LOAD Dec 13 03:37:35.258000 audit: BPF prog-id=12 op=UNLOAD Dec 13 03:37:35.258000 audit: BPF prog-id=16 op=LOAD Dec 13 03:37:35.258000 audit: BPF prog-id=17 op=LOAD Dec 13 03:37:35.258000 audit: BPF prog-id=13 op=UNLOAD Dec 13 03:37:35.455005 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:37:35.455031 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:37:35.258000 audit: BPF prog-id=14 op=UNLOAD Dec 13 03:37:35.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.270000 audit: BPF prog-id=15 op=UNLOAD Dec 13 03:37:35.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.386000 audit: BPF prog-id=18 op=LOAD Dec 13 03:37:35.386000 audit: BPF prog-id=19 op=LOAD Dec 13 03:37:35.386000 audit: BPF prog-id=20 op=LOAD Dec 13 03:37:35.386000 audit: BPF prog-id=16 op=UNLOAD Dec 13 03:37:35.386000 audit: BPF prog-id=17 op=UNLOAD Dec 13 03:37:35.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.446000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 03:37:35.446000 audit[915]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe57f6f820 a2=4000 a3=7ffe57f6f8bc items=0 ppid=1 pid=915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:37:35.446000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 03:37:35.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.255673 systemd[1]: Queued start job for default target multi-user.target. Dec 13 03:37:35.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:31.306319 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:37:35.255685 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 03:37:31.307171 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:37:35.260077 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 03:37:31.307194 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:37:31.307231 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 03:37:31.307242 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 03:37:31.307272 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 03:37:35.457892 systemd[1]: Started systemd-journald.service. Dec 13 03:37:35.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:31.307286 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 03:37:35.457844 systemd[1]: Finished systemd-modules-load.service. Dec 13 03:37:31.307478 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 03:37:31.307517 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 03:37:31.307532 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 03:37:31.309699 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 03:37:31.309757 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 03:37:31.309779 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 03:37:35.466564 kernel: loop: module loaded Dec 13 03:37:35.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:31.309796 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 03:37:35.459557 systemd[1]: Finished systemd-network-generator.service. Dec 13 03:37:31.309815 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 03:37:35.460217 systemd[1]: Finished systemd-remount-fs.service. Dec 13 03:37:31.309831 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 03:37:35.461391 systemd[1]: Reached target network-pre.target. Dec 13 03:37:34.632265 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:37:35.463420 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 03:37:34.632535 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:37:35.464265 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 03:37:34.632648 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:37:34.632854 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 03:37:34.632916 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 03:37:34.632986 /usr/lib/systemd/system-generators/torcx-generator[849]: time="2024-12-13T03:37:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 03:37:35.468533 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 03:37:35.474119 systemd[1]: Starting systemd-journal-flush.service... Dec 13 03:37:35.475294 kernel: fuse: init (API version 7.34) Dec 13 03:37:35.474715 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:37:35.475751 systemd[1]: Starting systemd-random-seed.service... Dec 13 03:37:35.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.485868 systemd-journald[915]: Time spent on flushing to /var/log/journal/39a51881da994a12840b60edbf64e156 is 44.065ms for 1084 entries. Dec 13 03:37:35.485868 systemd-journald[915]: System Journal (/var/log/journal/39a51881da994a12840b60edbf64e156) is 8.0M, max 584.8M, 576.8M free. Dec 13 03:37:35.557638 systemd-journald[915]: Received client request to flush runtime journal. Dec 13 03:37:35.557684 kernel: kauditd_printk_skb: 93 callbacks suppressed Dec 13 03:37:35.557704 kernel: audit: type=1130 audit(1734061055.488:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.563816 kernel: audit: type=1131 audit(1734061055.488:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.563850 kernel: audit: type=1130 audit(1734061055.504:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.563868 kernel: audit: type=1130 audit(1734061055.516:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.563885 kernel: audit: type=1130 audit(1734061055.546:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.477179 systemd[1]: Starting systemd-sysctl.service... Dec 13 03:37:35.479276 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:37:35.479419 systemd[1]: Finished modprobe@loop.service. Dec 13 03:37:35.481077 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 03:37:35.482836 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:37:35.488942 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 03:37:35.489069 systemd[1]: Finished modprobe@fuse.service. Dec 13 03:37:35.490801 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 03:37:35.504299 systemd[1]: Finished systemd-random-seed.service. Dec 13 03:37:35.504922 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 03:37:35.509381 systemd[1]: Reached target first-boot-complete.target. Dec 13 03:37:35.517041 systemd[1]: Finished systemd-sysctl.service. Dec 13 03:37:35.546319 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 03:37:35.549967 systemd[1]: Starting systemd-sysusers.service... Dec 13 03:37:35.564713 systemd[1]: Finished systemd-journal-flush.service. Dec 13 03:37:35.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.574078 kernel: audit: type=1130 audit(1734061055.568:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.577786 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 03:37:35.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.579478 systemd[1]: Starting systemd-udev-settle.service... Dec 13 03:37:35.582742 kernel: audit: type=1130 audit(1734061055.577:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.588366 udevadm[960]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 03:37:35.595100 systemd[1]: Finished systemd-sysusers.service. Dec 13 03:37:35.600644 kernel: audit: type=1130 audit(1734061055.594:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.599591 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 03:37:35.635963 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 03:37:35.641096 kernel: audit: type=1130 audit(1734061055.635:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:35.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.186032 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 03:37:36.197067 kernel: audit: type=1130 audit(1734061056.186:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.196000 audit: BPF prog-id=21 op=LOAD Dec 13 03:37:36.196000 audit: BPF prog-id=22 op=LOAD Dec 13 03:37:36.196000 audit: BPF prog-id=7 op=UNLOAD Dec 13 03:37:36.196000 audit: BPF prog-id=8 op=UNLOAD Dec 13 03:37:36.198707 systemd[1]: Starting systemd-udevd.service... Dec 13 03:37:36.239499 systemd-udevd[963]: Using default interface naming scheme 'v252'. Dec 13 03:37:36.294451 systemd[1]: Started systemd-udevd.service. Dec 13 03:37:36.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.300000 audit: BPF prog-id=23 op=LOAD Dec 13 03:37:36.303619 systemd[1]: Starting systemd-networkd.service... Dec 13 03:37:36.316000 audit: BPF prog-id=24 op=LOAD Dec 13 03:37:36.317000 audit: BPF prog-id=25 op=LOAD Dec 13 03:37:36.318000 audit: BPF prog-id=26 op=LOAD Dec 13 03:37:36.321999 systemd[1]: Starting systemd-userdbd.service... Dec 13 03:37:36.354880 systemd[1]: Started systemd-userdbd.service. Dec 13 03:37:36.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.375893 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 03:37:36.472756 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 03:37:36.468000 audit[968]: AVC avc: denied { confidentiality } for pid=968 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 03:37:36.479749 kernel: ACPI: button: Power Button [PWRF] Dec 13 03:37:36.468000 audit[968]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a15db0b720 a1=337fc a2=7f01d5d79bc5 a3=5 items=110 ppid=963 pid=968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:37:36.468000 audit: CWD cwd="/" Dec 13 03:37:36.468000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=1 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=2 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=3 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=4 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=5 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=6 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=7 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=8 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=9 name=(null) inode=14397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=10 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=11 name=(null) inode=14398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=12 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=13 name=(null) inode=14399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=14 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=15 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=16 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=17 name=(null) inode=14401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=18 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=19 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=20 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=21 name=(null) inode=14403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=22 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=23 name=(null) inode=14404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=24 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=25 name=(null) inode=14405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=26 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=27 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=28 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=29 name=(null) inode=14407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=30 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=31 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=32 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=33 name=(null) inode=14409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=34 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=35 name=(null) inode=14410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=36 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=37 name=(null) inode=14411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=38 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=39 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=40 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=41 name=(null) inode=14413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=42 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=43 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=44 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=45 name=(null) inode=14415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=46 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=47 name=(null) inode=14416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=48 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=49 name=(null) inode=14417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=50 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=51 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=52 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=53 name=(null) inode=14419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=55 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=56 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=57 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=58 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=59 name=(null) inode=14422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=60 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=61 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=62 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=63 name=(null) inode=14424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=64 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=65 name=(null) inode=14425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=66 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=67 name=(null) inode=14426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=68 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=69 name=(null) inode=14427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=70 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=71 name=(null) inode=14428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=72 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=73 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=74 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=75 name=(null) inode=14430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=76 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=77 name=(null) inode=14431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=78 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=79 name=(null) inode=14432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=80 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=81 name=(null) inode=14433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=82 name=(null) inode=14429 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=83 name=(null) inode=14434 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=84 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=85 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=86 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=87 name=(null) inode=14436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=88 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=89 name=(null) inode=14437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=90 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=91 name=(null) inode=14438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=92 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=93 name=(null) inode=14439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=94 name=(null) inode=14435 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=95 name=(null) inode=14440 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=96 name=(null) inode=14420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=97 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=98 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=99 name=(null) inode=14442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=100 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=101 name=(null) inode=14443 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=102 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=103 name=(null) inode=14444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=104 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=105 name=(null) inode=14445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=106 name=(null) inode=14441 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=107 name=(null) inode=14446 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PATH item=109 name=(null) inode=14447 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:37:36.468000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 03:37:36.500767 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 03:37:36.502742 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 03:37:36.509191 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 03:37:36.513851 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 03:37:36.541448 systemd-networkd[979]: lo: Link UP Dec 13 03:37:36.541458 systemd-networkd[979]: lo: Gained carrier Dec 13 03:37:36.541903 systemd-networkd[979]: Enumeration completed Dec 13 03:37:36.542607 systemd-networkd[979]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 03:37:36.544227 systemd-networkd[979]: eth0: Link UP Dec 13 03:37:36.544300 systemd-networkd[979]: eth0: Gained carrier Dec 13 03:37:36.557841 systemd-networkd[979]: eth0: DHCPv4 address 172.24.4.167/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 03:37:36.566974 systemd[1]: Started systemd-networkd.service. Dec 13 03:37:36.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.573112 systemd[1]: Finished systemd-udev-settle.service. Dec 13 03:37:36.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.574927 systemd[1]: Starting lvm2-activation-early.service... Dec 13 03:37:36.602853 lvm[992]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:37:36.630040 systemd[1]: Finished lvm2-activation-early.service. Dec 13 03:37:36.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.631356 systemd[1]: Reached target cryptsetup.target. Dec 13 03:37:36.634674 systemd[1]: Starting lvm2-activation.service... Dec 13 03:37:36.638499 lvm[993]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 03:37:36.664434 systemd[1]: Finished lvm2-activation.service. Dec 13 03:37:36.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:36.665807 systemd[1]: Reached target local-fs-pre.target. Dec 13 03:37:36.666896 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 03:37:36.666953 systemd[1]: Reached target local-fs.target. Dec 13 03:37:36.667963 systemd[1]: Reached target machines.target. Dec 13 03:37:36.671220 systemd[1]: Starting ldconfig.service... Dec 13 03:37:36.673827 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:37:36.673896 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:37:36.675547 systemd[1]: Starting systemd-boot-update.service... Dec 13 03:37:36.678499 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 03:37:36.687293 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 03:37:36.689561 systemd[1]: Starting systemd-sysext.service... Dec 13 03:37:36.690436 systemd[1]: boot.automount: Got automount request for /boot, triggered by 995 (bootctl) Dec 13 03:37:36.692407 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 03:37:36.718414 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 03:37:36.783563 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 03:37:36.783823 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 03:37:36.803796 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 03:37:36.804539 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 03:37:36.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.725304 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 03:37:37.727639 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 03:37:37.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.772837 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 03:37:37.807807 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 03:37:37.877133 (sd-sysext)[1011]: Using extensions 'kubernetes'. Dec 13 03:37:37.879847 (sd-sysext)[1011]: Merged extensions into '/usr'. Dec 13 03:37:37.932609 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:37.939294 systemd-fsck[1008]: fsck.fat 4.2 (2021-01-31) Dec 13 03:37:37.939294 systemd-fsck[1008]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 03:37:37.942269 systemd[1]: Mounting usr-share-oem.mount... Dec 13 03:37:37.946247 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:37:37.952321 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:37:37.960342 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:37:37.965672 systemd[1]: Starting modprobe@loop.service... Dec 13 03:37:37.966630 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:37:37.966806 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:37:37.966956 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:37.971617 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 03:37:37.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.972939 systemd[1]: Mounted usr-share-oem.mount. Dec 13 03:37:37.973870 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:37:37.974171 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:37:37.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.975321 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:37:37.975458 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:37:37.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.976544 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:37:37.976664 systemd[1]: Finished modprobe@loop.service. Dec 13 03:37:37.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.983135 systemd[1]: Mounting boot.mount... Dec 13 03:37:37.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:37.984227 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:37:37.984282 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:37:37.984627 systemd[1]: Finished systemd-sysext.service. Dec 13 03:37:37.988608 systemd[1]: Starting ensure-sysext.service... Dec 13 03:37:37.991491 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 03:37:38.000477 systemd[1]: Reloading. Dec 13 03:37:38.002042 systemd-tmpfiles[1019]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 03:37:38.007044 systemd-tmpfiles[1019]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 03:37:38.010663 systemd-tmpfiles[1019]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 03:37:38.095675 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2024-12-13T03:37:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:37:38.096156 /usr/lib/systemd/system-generators/torcx-generator[1039]: time="2024-12-13T03:37:38Z" level=info msg="torcx already run" Dec 13 03:37:38.206181 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:37:38.206205 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:37:38.231757 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:37:38.290000 audit: BPF prog-id=27 op=LOAD Dec 13 03:37:38.290000 audit: BPF prog-id=28 op=LOAD Dec 13 03:37:38.290000 audit: BPF prog-id=21 op=UNLOAD Dec 13 03:37:38.291000 audit: BPF prog-id=22 op=UNLOAD Dec 13 03:37:38.291000 audit: BPF prog-id=29 op=LOAD Dec 13 03:37:38.291000 audit: BPF prog-id=23 op=UNLOAD Dec 13 03:37:38.294000 audit: BPF prog-id=30 op=LOAD Dec 13 03:37:38.294000 audit: BPF prog-id=24 op=UNLOAD Dec 13 03:37:38.294000 audit: BPF prog-id=31 op=LOAD Dec 13 03:37:38.294000 audit: BPF prog-id=32 op=LOAD Dec 13 03:37:38.294000 audit: BPF prog-id=25 op=UNLOAD Dec 13 03:37:38.294000 audit: BPF prog-id=26 op=UNLOAD Dec 13 03:37:38.296000 audit: BPF prog-id=33 op=LOAD Dec 13 03:37:38.296000 audit: BPF prog-id=18 op=UNLOAD Dec 13 03:37:38.296000 audit: BPF prog-id=34 op=LOAD Dec 13 03:37:38.296000 audit: BPF prog-id=35 op=LOAD Dec 13 03:37:38.296000 audit: BPF prog-id=19 op=UNLOAD Dec 13 03:37:38.296000 audit: BPF prog-id=20 op=UNLOAD Dec 13 03:37:38.311465 systemd[1]: Mounted boot.mount. Dec 13 03:37:38.356618 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:38.357043 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 03:37:38.359054 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 03:37:38.362251 systemd[1]: Starting modprobe@drm.service... Dec 13 03:37:38.364555 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 03:37:38.366352 systemd[1]: Starting modprobe@loop.service... Dec 13 03:37:38.367345 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 03:37:38.367467 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:37:38.371877 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 03:37:38.372541 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 03:37:38.373955 systemd[1]: Finished systemd-boot-update.service. Dec 13 03:37:38.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.375013 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 03:37:38.375139 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 03:37:38.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.376232 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 03:37:38.376340 systemd[1]: Finished modprobe@drm.service. Dec 13 03:37:38.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.377166 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 03:37:38.377272 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 03:37:38.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.378207 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 03:37:38.378313 systemd[1]: Finished modprobe@loop.service. Dec 13 03:37:38.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.380346 systemd[1]: Finished ensure-sysext.service. Dec 13 03:37:38.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.381861 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 03:37:38.381901 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 03:37:38.431772 ldconfig[994]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 03:37:38.442473 systemd[1]: Finished ldconfig.service. Dec 13 03:37:38.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.448927 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 03:37:38.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.450586 systemd[1]: Starting audit-rules.service... Dec 13 03:37:38.451969 systemd[1]: Starting clean-ca-certificates.service... Dec 13 03:37:38.454000 audit: BPF prog-id=36 op=LOAD Dec 13 03:37:38.453566 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 03:37:38.456532 systemd[1]: Starting systemd-resolved.service... Dec 13 03:37:38.458000 audit: BPF prog-id=37 op=LOAD Dec 13 03:37:38.460569 systemd[1]: Starting systemd-timesyncd.service... Dec 13 03:37:38.463237 systemd[1]: Starting systemd-update-utmp.service... Dec 13 03:37:38.466161 systemd[1]: Finished clean-ca-certificates.service. Dec 13 03:37:38.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.466715 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 03:37:38.477000 audit[1096]: SYSTEM_BOOT pid=1096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.480991 systemd[1]: Finished systemd-update-utmp.service. Dec 13 03:37:38.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.501582 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 03:37:38.503365 systemd[1]: Starting systemd-update-done.service... Dec 13 03:37:38.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.509822 systemd[1]: Finished systemd-update-done.service. Dec 13 03:37:38.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:37:38.534000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 03:37:38.534000 audit[1112]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4b0a26d0 a2=420 a3=0 items=0 ppid=1091 pid=1112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:37:38.534000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 03:37:38.535699 augenrules[1112]: No rules Dec 13 03:37:38.537527 systemd[1]: Finished audit-rules.service. Dec 13 03:37:38.544270 systemd[1]: Started systemd-timesyncd.service. Dec 13 03:37:38.544862 systemd[1]: Reached target time-set.target. Dec 13 03:37:38.556747 systemd-resolved[1094]: Positive Trust Anchors: Dec 13 03:37:38.556761 systemd-resolved[1094]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 03:37:38.556797 systemd-resolved[1094]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 03:37:38.563984 systemd-resolved[1094]: Using system hostname 'ci-3510-3-6-5-2a90ac038f.novalocal'. Dec 13 03:37:39.039478 systemd-timesyncd[1095]: Contacted time server 194.177.34.116:123 (0.flatcar.pool.ntp.org). Dec 13 03:37:39.039769 systemd-timesyncd[1095]: Initial clock synchronization to Fri 2024-12-13 03:37:39.039394 UTC. Dec 13 03:37:39.040879 systemd[1]: Started systemd-resolved.service. Dec 13 03:37:39.041413 systemd[1]: Reached target network.target. Dec 13 03:37:39.041818 systemd[1]: Reached target nss-lookup.target. Dec 13 03:37:39.042249 systemd[1]: Reached target sysinit.target. Dec 13 03:37:39.042742 systemd[1]: Started motdgen.path. Dec 13 03:37:39.043169 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 03:37:39.043819 systemd[1]: Started logrotate.timer. Dec 13 03:37:39.044402 systemd[1]: Started mdadm.timer. Dec 13 03:37:39.044834 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 03:37:39.045313 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 03:37:39.045344 systemd[1]: Reached target paths.target. Dec 13 03:37:39.045771 systemd[1]: Reached target timers.target. Dec 13 03:37:39.046493 systemd[1]: Listening on dbus.socket. Dec 13 03:37:39.048054 systemd[1]: Starting docker.socket... Dec 13 03:37:39.051555 systemd[1]: Listening on sshd.socket. Dec 13 03:37:39.052080 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:37:39.052465 systemd[1]: Listening on docker.socket. Dec 13 03:37:39.052959 systemd[1]: Reached target sockets.target. Dec 13 03:37:39.053430 systemd[1]: Reached target basic.target. Dec 13 03:37:39.053930 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:37:39.053962 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 03:37:39.054891 systemd[1]: Starting containerd.service... Dec 13 03:37:39.057063 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 03:37:39.058544 systemd[1]: Starting dbus.service... Dec 13 03:37:39.060581 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 03:37:39.062241 systemd-networkd[979]: eth0: Gained IPv6LL Dec 13 03:37:39.062666 systemd[1]: Starting extend-filesystems.service... Dec 13 03:37:39.063787 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 03:37:39.066178 systemd[1]: Starting motdgen.service... Dec 13 03:37:39.068051 systemd[1]: Starting prepare-helm.service... Dec 13 03:37:39.070393 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 03:37:39.079688 systemd[1]: Starting sshd-keygen.service... Dec 13 03:37:39.082886 systemd[1]: Starting systemd-logind.service... Dec 13 03:37:39.083484 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 03:37:39.083579 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 03:37:39.084029 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 03:37:39.085824 systemd[1]: Starting update-engine.service... Dec 13 03:37:39.089188 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 03:37:39.091338 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 03:37:39.095466 systemd[1]: Reached target network-online.target. Dec 13 03:37:39.099175 systemd[1]: Starting kubelet.service... Dec 13 03:37:39.103652 jq[1135]: true Dec 13 03:37:39.122405 jq[1125]: false Dec 13 03:37:39.127371 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 03:37:39.127527 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 03:37:39.135289 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 03:37:39.135461 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 03:37:39.140266 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 03:37:39.140476 systemd[1]: Finished motdgen.service. Dec 13 03:37:39.148378 tar[1137]: linux-amd64/helm Dec 13 03:37:39.149838 jq[1142]: true Dec 13 03:37:39.150854 extend-filesystems[1126]: Found loop1 Dec 13 03:37:39.155460 extend-filesystems[1126]: Found vda Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda1 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda2 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda3 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found usr Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda4 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda6 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda7 Dec 13 03:37:39.157248 extend-filesystems[1126]: Found vda9 Dec 13 03:37:39.157248 extend-filesystems[1126]: Checking size of /dev/vda9 Dec 13 03:37:39.162218 dbus-daemon[1122]: [system] SELinux support is enabled Dec 13 03:37:39.162363 systemd[1]: Started dbus.service. Dec 13 03:37:39.173626 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 03:37:39.173658 systemd[1]: Reached target system-config.target. Dec 13 03:37:39.174445 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 03:37:39.174464 systemd[1]: Reached target user-config.target. Dec 13 03:37:39.186338 extend-filesystems[1126]: Resized partition /dev/vda9 Dec 13 03:37:39.211173 extend-filesystems[1177]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 03:37:39.228894 env[1140]: time="2024-12-13T03:37:39.228811968Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 03:37:39.246282 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 03:37:39.302274 update_engine[1134]: I1213 03:37:39.300887 1134 main.cc:92] Flatcar Update Engine starting Dec 13 03:37:39.360592 update_engine[1134]: I1213 03:37:39.312654 1134 update_check_scheduler.cc:74] Next update check in 4m41s Dec 13 03:37:39.312607 systemd[1]: Started update-engine.service. Dec 13 03:37:39.360956 env[1140]: time="2024-12-13T03:37:39.303387695Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 03:37:39.315387 systemd[1]: Started locksmithd.service. Dec 13 03:37:39.360831 systemd-logind[1133]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 03:37:39.360849 systemd-logind[1133]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 03:37:39.362196 systemd-logind[1133]: New seat seat0. Dec 13 03:37:39.366866 env[1140]: time="2024-12-13T03:37:39.366555616Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.369760 systemd[1]: Started systemd-logind.service. Dec 13 03:37:39.372563 env[1140]: time="2024-12-13T03:37:39.371127801Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:37:39.372563 env[1140]: time="2024-12-13T03:37:39.371183335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375303543Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375329421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375346714Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375359658Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375451420Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375762363Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375907125Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.375928615Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.376006802Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 03:37:39.376158 env[1140]: time="2024-12-13T03:37:39.376022241Z" level=info msg="metadata content store policy set" policy=shared Dec 13 03:37:39.403002 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 03:37:39.414682 bash[1176]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:37:39.415051 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 03:37:39.529094 extend-filesystems[1177]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 03:37:39.529094 extend-filesystems[1177]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 03:37:39.529094 extend-filesystems[1177]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 03:37:39.523809 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537215418Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537298043Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537333780Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537435401Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537492057Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537540087Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537622552Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537663659Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537698214Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537732148Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537768055Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.537801508Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.538078177Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 03:37:39.544337 env[1140]: time="2024-12-13T03:37:39.538289563Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 03:37:39.545190 extend-filesystems[1126]: Resized filesystem in /dev/vda9 Dec 13 03:37:39.524184 systemd[1]: Finished extend-filesystems.service. Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539529669Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539620459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539680071Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539788494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539838248Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539872973Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539903750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539935650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.539966979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.542595018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.542634973Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.542675479Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.543101969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.543149518Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.550363 env[1140]: time="2024-12-13T03:37:39.543182470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.557199 env[1140]: time="2024-12-13T03:37:39.543213448Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 03:37:39.557199 env[1140]: time="2024-12-13T03:37:39.543250016Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 03:37:39.557199 env[1140]: time="2024-12-13T03:37:39.543281365Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 03:37:39.557199 env[1140]: time="2024-12-13T03:37:39.543326350Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 03:37:39.557199 env[1140]: time="2024-12-13T03:37:39.543407742Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 03:37:39.555262 systemd[1]: Started containerd.service. Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.543861032Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.546944225Z" level=info msg="Connect containerd service" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.547076573Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551634732Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551804831Z" level=info msg="Start subscribing containerd event" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551862860Z" level=info msg="Start recovering state" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551935526Z" level=info msg="Start event monitor" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551951326Z" level=info msg="Start snapshots syncer" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551962907Z" level=info msg="Start cni network conf syncer for default" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.551998895Z" level=info msg="Start streaming server" Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.554820066Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 03:37:39.557701 env[1140]: time="2024-12-13T03:37:39.554952094Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 03:37:39.568261 env[1140]: time="2024-12-13T03:37:39.563047326Z" level=info msg="containerd successfully booted in 0.334875s" Dec 13 03:37:39.989739 systemd[1]: Created slice system-sshd.slice. Dec 13 03:37:40.015026 tar[1137]: linux-amd64/LICENSE Dec 13 03:37:40.015100 tar[1137]: linux-amd64/README.md Dec 13 03:37:40.021487 systemd[1]: Finished prepare-helm.service. Dec 13 03:37:40.028782 locksmithd[1182]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 03:37:40.442333 sshd_keygen[1154]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 03:37:40.463762 systemd[1]: Finished sshd-keygen.service. Dec 13 03:37:40.465755 systemd[1]: Starting issuegen.service... Dec 13 03:37:40.467140 systemd[1]: Started sshd@0-172.24.4.167:22-172.24.4.1:60622.service. Dec 13 03:37:40.477628 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 03:37:40.477783 systemd[1]: Finished issuegen.service. Dec 13 03:37:40.479725 systemd[1]: Starting systemd-user-sessions.service... Dec 13 03:37:40.490477 systemd[1]: Finished systemd-user-sessions.service. Dec 13 03:37:40.492372 systemd[1]: Started getty@tty1.service. Dec 13 03:37:40.494072 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 03:37:40.498775 systemd[1]: Reached target getty.target. Dec 13 03:37:40.911891 systemd[1]: Started kubelet.service. Dec 13 03:37:41.853606 sshd[1202]: Accepted publickey for core from 172.24.4.1 port 60622 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:37:41.857139 sshd[1202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:41.891161 systemd[1]: Created slice user-500.slice. Dec 13 03:37:41.895196 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 03:37:41.903186 systemd-logind[1133]: New session 1 of user core. Dec 13 03:37:41.916696 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 03:37:41.919637 systemd[1]: Starting user@500.service... Dec 13 03:37:41.925016 (systemd)[1218]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:42.063331 systemd[1218]: Queued start job for default target default.target. Dec 13 03:37:42.065014 systemd[1218]: Reached target paths.target. Dec 13 03:37:42.065081 systemd[1218]: Reached target sockets.target. Dec 13 03:37:42.065116 systemd[1218]: Reached target timers.target. Dec 13 03:37:42.065149 systemd[1218]: Reached target basic.target. Dec 13 03:37:42.065409 systemd[1]: Started user@500.service. Dec 13 03:37:42.068888 systemd[1]: Started session-1.scope. Dec 13 03:37:42.070921 systemd[1218]: Reached target default.target. Dec 13 03:37:42.071070 systemd[1218]: Startup finished in 138ms. Dec 13 03:37:42.562628 kubelet[1211]: E1213 03:37:42.562541 1211 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:37:42.564494 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:37:42.564634 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:37:42.564880 systemd[1]: kubelet.service: Consumed 1.884s CPU time. Dec 13 03:37:42.633131 systemd[1]: Started sshd@1-172.24.4.167:22-172.24.4.1:38460.service. Dec 13 03:37:43.809488 sshd[1228]: Accepted publickey for core from 172.24.4.1 port 38460 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:37:43.812030 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:43.822547 systemd-logind[1133]: New session 2 of user core. Dec 13 03:37:43.823349 systemd[1]: Started session-2.scope. Dec 13 03:37:44.452026 sshd[1228]: pam_unix(sshd:session): session closed for user core Dec 13 03:37:44.458556 systemd[1]: sshd@1-172.24.4.167:22-172.24.4.1:38460.service: Deactivated successfully. Dec 13 03:37:44.460202 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 03:37:44.462077 systemd-logind[1133]: Session 2 logged out. Waiting for processes to exit. Dec 13 03:37:44.465339 systemd[1]: Started sshd@2-172.24.4.167:22-172.24.4.1:38470.service. Dec 13 03:37:44.469873 systemd-logind[1133]: Removed session 2. Dec 13 03:37:45.673042 sshd[1234]: Accepted publickey for core from 172.24.4.1 port 38470 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:37:45.675884 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:45.686971 systemd-logind[1133]: New session 3 of user core. Dec 13 03:37:45.688127 systemd[1]: Started session-3.scope. Dec 13 03:37:46.213538 coreos-metadata[1121]: Dec 13 03:37:46.213 WARN failed to locate config-drive, using the metadata service API instead Dec 13 03:37:46.301622 coreos-metadata[1121]: Dec 13 03:37:46.301 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 03:37:46.315077 sshd[1234]: pam_unix(sshd:session): session closed for user core Dec 13 03:37:46.317904 systemd[1]: sshd@2-172.24.4.167:22-172.24.4.1:38470.service: Deactivated successfully. Dec 13 03:37:46.319429 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 03:37:46.320574 systemd-logind[1133]: Session 3 logged out. Waiting for processes to exit. Dec 13 03:37:46.321727 systemd-logind[1133]: Removed session 3. Dec 13 03:37:46.638462 coreos-metadata[1121]: Dec 13 03:37:46.638 INFO Fetch successful Dec 13 03:37:46.638623 coreos-metadata[1121]: Dec 13 03:37:46.638 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 03:37:46.654168 coreos-metadata[1121]: Dec 13 03:37:46.654 INFO Fetch successful Dec 13 03:37:46.663922 unknown[1121]: wrote ssh authorized keys file for user: core Dec 13 03:37:46.705284 update-ssh-keys[1241]: Updated "/home/core/.ssh/authorized_keys" Dec 13 03:37:46.707059 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 03:37:46.708320 systemd[1]: Reached target multi-user.target. Dec 13 03:37:46.712431 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 03:37:46.730603 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 03:37:46.731021 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 03:37:46.734246 systemd[1]: Startup finished in 1.003s (kernel) + 7.138s (initrd) + 15.346s (userspace) = 23.488s. Dec 13 03:37:52.816175 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 03:37:52.818057 systemd[1]: Stopped kubelet.service. Dec 13 03:37:52.818148 systemd[1]: kubelet.service: Consumed 1.884s CPU time. Dec 13 03:37:52.821466 systemd[1]: Starting kubelet.service... Dec 13 03:37:53.035893 systemd[1]: Started kubelet.service. Dec 13 03:37:53.532139 kubelet[1247]: E1213 03:37:53.532059 1247 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:37:53.539843 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:37:53.540103 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:37:56.324277 systemd[1]: Started sshd@3-172.24.4.167:22-172.24.4.1:54326.service. Dec 13 03:37:57.636145 sshd[1255]: Accepted publickey for core from 172.24.4.1 port 54326 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:37:57.639450 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:57.649106 systemd-logind[1133]: New session 4 of user core. Dec 13 03:37:57.650783 systemd[1]: Started session-4.scope. Dec 13 03:37:58.279875 sshd[1255]: pam_unix(sshd:session): session closed for user core Dec 13 03:37:58.290451 systemd[1]: Started sshd@4-172.24.4.167:22-172.24.4.1:54342.service. Dec 13 03:37:58.291831 systemd[1]: sshd@3-172.24.4.167:22-172.24.4.1:54326.service: Deactivated successfully. Dec 13 03:37:58.294799 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 03:37:58.298116 systemd-logind[1133]: Session 4 logged out. Waiting for processes to exit. Dec 13 03:37:58.300913 systemd-logind[1133]: Removed session 4. Dec 13 03:37:59.758468 sshd[1260]: Accepted publickey for core from 172.24.4.1 port 54342 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:37:59.761732 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:37:59.773174 systemd[1]: Started session-5.scope. Dec 13 03:37:59.777083 systemd-logind[1133]: New session 5 of user core. Dec 13 03:38:00.633780 sshd[1260]: pam_unix(sshd:session): session closed for user core Dec 13 03:38:00.641395 systemd[1]: Started sshd@5-172.24.4.167:22-172.24.4.1:54350.service. Dec 13 03:38:00.645737 systemd[1]: sshd@4-172.24.4.167:22-172.24.4.1:54342.service: Deactivated successfully. Dec 13 03:38:00.648537 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 03:38:00.651010 systemd-logind[1133]: Session 5 logged out. Waiting for processes to exit. Dec 13 03:38:00.654079 systemd-logind[1133]: Removed session 5. Dec 13 03:38:02.321207 sshd[1266]: Accepted publickey for core from 172.24.4.1 port 54350 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:38:02.324176 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:38:02.333081 systemd-logind[1133]: New session 6 of user core. Dec 13 03:38:02.333825 systemd[1]: Started session-6.scope. Dec 13 03:38:02.965192 sshd[1266]: pam_unix(sshd:session): session closed for user core Dec 13 03:38:02.971267 systemd[1]: Started sshd@6-172.24.4.167:22-172.24.4.1:54352.service. Dec 13 03:38:02.972420 systemd[1]: sshd@5-172.24.4.167:22-172.24.4.1:54350.service: Deactivated successfully. Dec 13 03:38:02.975766 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 03:38:02.978607 systemd-logind[1133]: Session 6 logged out. Waiting for processes to exit. Dec 13 03:38:02.981396 systemd-logind[1133]: Removed session 6. Dec 13 03:38:03.791667 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 03:38:03.792170 systemd[1]: Stopped kubelet.service. Dec 13 03:38:03.795040 systemd[1]: Starting kubelet.service... Dec 13 03:38:04.053781 systemd[1]: Started kubelet.service. Dec 13 03:38:04.470359 kubelet[1279]: E1213 03:38:04.469626 1279 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:38:04.476033 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:38:04.476346 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:38:04.515261 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 54352 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:38:04.518157 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:38:04.530145 systemd[1]: Started session-7.scope. Dec 13 03:38:04.531053 systemd-logind[1133]: New session 7 of user core. Dec 13 03:38:05.005957 sudo[1287]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 03:38:05.006534 sudo[1287]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:38:05.019298 dbus-daemon[1122]: \xd0\u001dL1)V: received setenforce notice (enforcing=-41690608) Dec 13 03:38:05.023395 sudo[1287]: pam_unix(sudo:session): session closed for user root Dec 13 03:38:05.240972 sshd[1272]: pam_unix(sshd:session): session closed for user core Dec 13 03:38:05.246255 systemd[1]: Started sshd@7-172.24.4.167:22-172.24.4.1:38204.service. Dec 13 03:38:05.251241 systemd[1]: sshd@6-172.24.4.167:22-172.24.4.1:54352.service: Deactivated successfully. Dec 13 03:38:05.252829 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 03:38:05.255293 systemd-logind[1133]: Session 7 logged out. Waiting for processes to exit. Dec 13 03:38:05.258230 systemd-logind[1133]: Removed session 7. Dec 13 03:38:06.550207 sshd[1290]: Accepted publickey for core from 172.24.4.1 port 38204 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:38:06.553676 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:38:06.564168 systemd[1]: Started session-8.scope. Dec 13 03:38:06.565531 systemd-logind[1133]: New session 8 of user core. Dec 13 03:38:07.026171 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 03:38:07.027777 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:38:07.034187 sudo[1295]: pam_unix(sudo:session): session closed for user root Dec 13 03:38:07.044665 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 03:38:07.045247 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:38:07.065284 systemd[1]: Stopping audit-rules.service... Dec 13 03:38:07.071155 kernel: kauditd_printk_skb: 178 callbacks suppressed Dec 13 03:38:07.071333 kernel: audit: type=1305 audit(1734061087.066:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:38:07.066000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 03:38:07.066000 audit[1298]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc9b8cebc0 a2=420 a3=0 items=0 ppid=1 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:07.086124 kernel: audit: type=1300 audit(1734061087.066:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc9b8cebc0 a2=420 a3=0 items=0 ppid=1 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:07.086236 kernel: audit: type=1327 audit(1734061087.066:205): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:38:07.066000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 03:38:07.086364 auditctl[1298]: No rules Dec 13 03:38:07.098489 kernel: audit: type=1131 audit(1734061087.085:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.087501 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 03:38:07.087875 systemd[1]: Stopped audit-rules.service. Dec 13 03:38:07.101803 systemd[1]: Starting audit-rules.service... Dec 13 03:38:07.144177 augenrules[1315]: No rules Dec 13 03:38:07.145527 systemd[1]: Finished audit-rules.service. Dec 13 03:38:07.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.147967 sudo[1294]: pam_unix(sudo:session): session closed for user root Dec 13 03:38:07.156064 kernel: audit: type=1130 audit(1734061087.145:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.156177 kernel: audit: type=1106 audit(1734061087.145:208): pid=1294 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.145000 audit[1294]: USER_END pid=1294 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.166214 kernel: audit: type=1104 audit(1734061087.145:209): pid=1294 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.145000 audit[1294]: CRED_DISP pid=1294 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.476182 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 13 03:38:07.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.167:22-172.24.4.1:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.484036 systemd[1]: Started sshd@8-172.24.4.167:22-172.24.4.1:38218.service. Dec 13 03:38:07.499072 kernel: audit: type=1130 audit(1734061087.483:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.167:22-172.24.4.1:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:07.500066 systemd[1]: sshd@7-172.24.4.167:22-172.24.4.1:38204.service: Deactivated successfully. Dec 13 03:38:07.501558 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 03:38:07.504117 systemd-logind[1133]: Session 8 logged out. Waiting for processes to exit. Dec 13 03:38:07.484000 audit[1290]: USER_END pid=1290 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:07.506520 systemd-logind[1133]: Removed session 8. Dec 13 03:38:07.484000 audit[1290]: CRED_DISP pid=1290 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:07.526656 kernel: audit: type=1106 audit(1734061087.484:211): pid=1290 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:07.526776 kernel: audit: type=1104 audit(1734061087.484:212): pid=1290 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:07.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.167:22-172.24.4.1:38204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:08.674000 audit[1320]: USER_ACCT pid=1320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:08.676321 sshd[1320]: Accepted publickey for core from 172.24.4.1 port 38218 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:38:08.679000 audit[1320]: CRED_ACQ pid=1320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:08.679000 audit[1320]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe32229ae0 a2=3 a3=0 items=0 ppid=1 pid=1320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:08.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:38:08.681210 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:38:08.692186 systemd-logind[1133]: New session 9 of user core. Dec 13 03:38:08.693259 systemd[1]: Started session-9.scope. Dec 13 03:38:08.704000 audit[1320]: USER_START pid=1320 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:08.708000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:09.150000 audit[1324]: USER_ACCT pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:09.153377 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 03:38:09.153000 audit[1324]: CRED_REFR pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:09.154740 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 03:38:09.157000 audit[1324]: USER_START pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:09.208940 systemd[1]: Starting docker.service... Dec 13 03:38:09.271447 env[1334]: time="2024-12-13T03:38:09.271351213Z" level=info msg="Starting up" Dec 13 03:38:09.275552 env[1334]: time="2024-12-13T03:38:09.275501126Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 03:38:09.275552 env[1334]: time="2024-12-13T03:38:09.275528016Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 03:38:09.275552 env[1334]: time="2024-12-13T03:38:09.275552312Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 03:38:09.275800 env[1334]: time="2024-12-13T03:38:09.275566017Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 03:38:09.279125 env[1334]: time="2024-12-13T03:38:09.279070430Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 03:38:09.279317 env[1334]: time="2024-12-13T03:38:09.279280784Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 03:38:09.279481 env[1334]: time="2024-12-13T03:38:09.279441195Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 03:38:09.279630 env[1334]: time="2024-12-13T03:38:09.279598611Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 03:38:09.293962 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport163807558-merged.mount: Deactivated successfully. Dec 13 03:38:09.355137 env[1334]: time="2024-12-13T03:38:09.355058045Z" level=info msg="Loading containers: start." Dec 13 03:38:09.469000 audit[1364]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.469000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd24336510 a2=0 a3=7ffd243364fc items=0 ppid=1334 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.469000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 03:38:09.474000 audit[1366]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.474000 audit[1366]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe7bda9cd0 a2=0 a3=7ffe7bda9cbc items=0 ppid=1334 pid=1366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 03:38:09.477000 audit[1368]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.477000 audit[1368]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe8d9ec640 a2=0 a3=7ffe8d9ec62c items=0 ppid=1334 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 03:38:09.479000 audit[1370]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.479000 audit[1370]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcbda33a30 a2=0 a3=7ffcbda33a1c items=0 ppid=1334 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.479000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 03:38:09.482000 audit[1372]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.482000 audit[1372]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb58cc2b0 a2=0 a3=7fffb58cc29c items=0 ppid=1334 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 03:38:09.500000 audit[1377]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.500000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdf6f0b10 a2=0 a3=7fffdf6f0afc items=0 ppid=1334 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 03:38:09.519000 audit[1379]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.519000 audit[1379]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef9221370 a2=0 a3=7ffef922135c items=0 ppid=1334 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.519000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 03:38:09.522000 audit[1381]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.522000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc34932fc0 a2=0 a3=7ffc34932fac items=0 ppid=1334 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.522000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 03:38:09.524000 audit[1383]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.524000 audit[1383]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe191edfa0 a2=0 a3=7ffe191edf8c items=0 ppid=1334 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:38:09.535000 audit[1387]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.535000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffec9458d0 a2=0 a3=7fffec9458bc items=0 ppid=1334 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:38:09.540000 audit[1388]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.540000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc7e8ed970 a2=0 a3=7ffc7e8ed95c items=0 ppid=1334 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:38:09.567055 kernel: Initializing XFRM netlink socket Dec 13 03:38:09.608253 env[1334]: time="2024-12-13T03:38:09.608214349Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 03:38:09.649000 audit[1396]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.649000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc88244590 a2=0 a3=7ffc8824457c items=0 ppid=1334 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 03:38:09.662000 audit[1399]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.662000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc52322840 a2=0 a3=7ffc5232282c items=0 ppid=1334 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 03:38:09.665000 audit[1402]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.665000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd7aef3230 a2=0 a3=7ffd7aef321c items=0 ppid=1334 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 03:38:09.668000 audit[1404]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.668000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffecfafcc0 a2=0 a3=7fffecfafcac items=0 ppid=1334 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 03:38:09.670000 audit[1406]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.670000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffffca41a40 a2=0 a3=7ffffca41a2c items=0 ppid=1334 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 03:38:09.672000 audit[1408]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.672000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffbedd7b90 a2=0 a3=7fffbedd7b7c items=0 ppid=1334 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 03:38:09.675000 audit[1410]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.675000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb6b47330 a2=0 a3=7ffcb6b4731c items=0 ppid=1334 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 03:38:09.685000 audit[1413]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.685000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffca0e18980 a2=0 a3=7ffca0e1896c items=0 ppid=1334 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 03:38:09.687000 audit[1415]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.687000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff1e5b1020 a2=0 a3=7fff1e5b100c items=0 ppid=1334 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 03:38:09.690000 audit[1417]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.690000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd7672dd00 a2=0 a3=7ffd7672dcec items=0 ppid=1334 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 03:38:09.692000 audit[1419]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.692000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe431bf630 a2=0 a3=7ffe431bf61c items=0 ppid=1334 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.692000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 03:38:09.694132 systemd-networkd[979]: docker0: Link UP Dec 13 03:38:09.706000 audit[1423]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.706000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc299bbf50 a2=0 a3=7ffc299bbf3c items=0 ppid=1334 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:38:09.712000 audit[1424]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:09.712000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7f863cb0 a2=0 a3=7fff7f863c9c items=0 ppid=1334 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:09.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 03:38:09.714068 env[1334]: time="2024-12-13T03:38:09.713963782Z" level=info msg="Loading containers: done." Dec 13 03:38:09.738639 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3694348676-merged.mount: Deactivated successfully. Dec 13 03:38:09.750549 env[1334]: time="2024-12-13T03:38:09.750514293Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 03:38:09.750842 env[1334]: time="2024-12-13T03:38:09.750823092Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 03:38:09.751034 env[1334]: time="2024-12-13T03:38:09.751017967Z" level=info msg="Daemon has completed initialization" Dec 13 03:38:09.783212 systemd[1]: Started docker.service. Dec 13 03:38:09.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:09.793226 env[1334]: time="2024-12-13T03:38:09.793143053Z" level=info msg="API listen on /run/docker.sock" Dec 13 03:38:11.809761 env[1140]: time="2024-12-13T03:38:11.809670179Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 03:38:12.627857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount509006067.mount: Deactivated successfully. Dec 13 03:38:14.632608 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 03:38:14.633037 systemd[1]: Stopped kubelet.service. Dec 13 03:38:14.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.637296 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 03:38:14.637360 kernel: audit: type=1130 audit(1734061094.632:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.645343 systemd[1]: Starting kubelet.service... Dec 13 03:38:14.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.656001 kernel: audit: type=1131 audit(1734061094.632:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.737301 kernel: audit: type=1130 audit(1734061094.731:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:14.732571 systemd[1]: Started kubelet.service. Dec 13 03:38:15.250074 kubelet[1470]: E1213 03:38:15.249873 1470 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:38:15.275188 kernel: audit: type=1131 audit(1734061095.258:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:15.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:15.257843 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:38:15.258439 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:38:15.747464 env[1140]: time="2024-12-13T03:38:15.747377556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:15.751076 env[1140]: time="2024-12-13T03:38:15.751028370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:15.754583 env[1140]: time="2024-12-13T03:38:15.754536293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:15.758027 env[1140]: time="2024-12-13T03:38:15.757943775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:15.760161 env[1140]: time="2024-12-13T03:38:15.760109929Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 03:38:15.778950 env[1140]: time="2024-12-13T03:38:15.778895311Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 03:38:19.813631 env[1140]: time="2024-12-13T03:38:19.813579839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:19.849228 env[1140]: time="2024-12-13T03:38:19.849099961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:19.857252 env[1140]: time="2024-12-13T03:38:19.857169855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:19.862867 env[1140]: time="2024-12-13T03:38:19.862794147Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:19.865742 env[1140]: time="2024-12-13T03:38:19.865615892Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 03:38:19.891713 env[1140]: time="2024-12-13T03:38:19.891645160Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 03:38:22.029393 env[1140]: time="2024-12-13T03:38:22.029279701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:22.036054 env[1140]: time="2024-12-13T03:38:22.036028170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:22.042899 env[1140]: time="2024-12-13T03:38:22.042846472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:22.045660 env[1140]: time="2024-12-13T03:38:22.045627189Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:22.048517 env[1140]: time="2024-12-13T03:38:22.048482076Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 03:38:22.061230 env[1140]: time="2024-12-13T03:38:22.061182089Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 03:38:24.101389 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3219979927.mount: Deactivated successfully. Dec 13 03:38:24.261610 update_engine[1134]: I1213 03:38:24.261073 1134 update_attempter.cc:509] Updating boot flags... Dec 13 03:38:25.178360 env[1140]: time="2024-12-13T03:38:25.178252446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:25.184482 env[1140]: time="2024-12-13T03:38:25.184425962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:25.192734 env[1140]: time="2024-12-13T03:38:25.192651061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:25.202651 env[1140]: time="2024-12-13T03:38:25.202564016Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:25.204170 env[1140]: time="2024-12-13T03:38:25.204111469Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 03:38:25.225601 env[1140]: time="2024-12-13T03:38:25.225514057Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 03:38:25.382542 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 03:38:25.383074 systemd[1]: Stopped kubelet.service. Dec 13 03:38:25.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.394478 kernel: audit: type=1130 audit(1734061105.382:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.394672 kernel: audit: type=1131 audit(1734061105.382:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.393793 systemd[1]: Starting kubelet.service... Dec 13 03:38:25.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.803189 systemd[1]: Started kubelet.service. Dec 13 03:38:25.808002 kernel: audit: type=1130 audit(1734061105.802:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:25.887728 kubelet[1516]: E1213 03:38:25.887589 1516 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:38:25.890850 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:38:25.891142 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:38:25.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:25.901020 kernel: audit: type=1131 audit(1734061105.890:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:27.122426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount135409362.mount: Deactivated successfully. Dec 13 03:38:28.852734 env[1140]: time="2024-12-13T03:38:28.852609829Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:28.858153 env[1140]: time="2024-12-13T03:38:28.858118077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:28.862583 env[1140]: time="2024-12-13T03:38:28.862526040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:28.867953 env[1140]: time="2024-12-13T03:38:28.867923157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:28.868553 env[1140]: time="2024-12-13T03:38:28.868526335Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 03:38:28.882468 env[1140]: time="2024-12-13T03:38:28.882395259Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 03:38:29.502894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2931724839.mount: Deactivated successfully. Dec 13 03:38:29.517484 env[1140]: time="2024-12-13T03:38:29.517420665Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:29.520935 env[1140]: time="2024-12-13T03:38:29.520884264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:29.527838 env[1140]: time="2024-12-13T03:38:29.527789943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:29.531119 env[1140]: time="2024-12-13T03:38:29.531041682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:29.532751 env[1140]: time="2024-12-13T03:38:29.532623645Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 03:38:29.554420 env[1140]: time="2024-12-13T03:38:29.554318734Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 03:38:30.215666 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149012266.mount: Deactivated successfully. Dec 13 03:38:34.534521 env[1140]: time="2024-12-13T03:38:34.534447304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:34.537693 env[1140]: time="2024-12-13T03:38:34.537663118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:34.540653 env[1140]: time="2024-12-13T03:38:34.540618160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:34.543859 env[1140]: time="2024-12-13T03:38:34.543761858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:34.544898 env[1140]: time="2024-12-13T03:38:34.544847452Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 03:38:35.933449 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 03:38:35.933645 systemd[1]: Stopped kubelet.service. Dec 13 03:38:35.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:35.934915 systemd[1]: Starting kubelet.service... Dec 13 03:38:35.939232 kernel: audit: type=1130 audit(1734061115.932:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:35.939342 kernel: audit: type=1131 audit(1734061115.932:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:35.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:36.609083 systemd[1]: Started kubelet.service. Dec 13 03:38:36.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:36.614108 kernel: audit: type=1130 audit(1734061116.608:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:36.718929 kubelet[1599]: E1213 03:38:36.718889 1599 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 03:38:36.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:36.720687 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 03:38:36.720827 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 03:38:36.726009 kernel: audit: type=1131 audit(1734061116.720:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:38.915208 systemd[1]: Stopped kubelet.service. Dec 13 03:38:38.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:38.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:38.933392 kernel: audit: type=1130 audit(1734061118.914:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:38.933455 kernel: audit: type=1131 audit(1734061118.917:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:38.934026 systemd[1]: Starting kubelet.service... Dec 13 03:38:38.968018 systemd[1]: Reloading. Dec 13 03:38:39.088135 /usr/lib/systemd/system-generators/torcx-generator[1631]: time="2024-12-13T03:38:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:38:39.088508 /usr/lib/systemd/system-generators/torcx-generator[1631]: time="2024-12-13T03:38:39Z" level=info msg="torcx already run" Dec 13 03:38:39.173647 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:38:39.173868 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:38:39.197184 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:38:39.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274777 kernel: audit: type=1400 audit(1734061119.266:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274844 kernel: audit: type=1400 audit(1734061119.270:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281999 kernel: audit: type=1400 audit(1734061119.270:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287998 kernel: audit: type=1400 audit(1734061119.270:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit: BPF prog-id=43 op=LOAD Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit: BPF prog-id=44 op=LOAD Dec 13 03:38:39.274000 audit: BPF prog-id=27 op=UNLOAD Dec 13 03:38:39.274000 audit: BPF prog-id=28 op=UNLOAD Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit: BPF prog-id=45 op=LOAD Dec 13 03:38:39.275000 audit: BPF prog-id=29 op=UNLOAD Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.276000 audit: BPF prog-id=46 op=LOAD Dec 13 03:38:39.276000 audit: BPF prog-id=37 op=UNLOAD Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.281000 audit: BPF prog-id=47 op=LOAD Dec 13 03:38:39.281000 audit: BPF prog-id=41 op=UNLOAD Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:39.287000 audit: BPF prog-id=48 op=LOAD Dec 13 03:38:39.287000 audit: BPF prog-id=30 op=UNLOAD Dec 13 03:38:39.312072 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 03:38:39.312312 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 03:38:39.312689 systemd[1]: Stopped kubelet.service. Dec 13 03:38:39.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 03:38:39.315185 systemd[1]: Starting kubelet.service... Dec 13 03:38:40.179214 systemd[1]: Started kubelet.service. Dec 13 03:38:40.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:40.273275 kubelet[1682]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:38:40.273886 kubelet[1682]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:38:40.274081 kubelet[1682]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:38:40.274395 kubelet[1682]: I1213 03:38:40.274328 1682 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:38:41.241521 kubelet[1682]: I1213 03:38:41.241471 1682 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:38:41.241910 kubelet[1682]: I1213 03:38:41.241882 1682 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:38:41.242587 kubelet[1682]: I1213 03:38:41.242554 1682 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:38:41.281456 kubelet[1682]: E1213 03:38:41.281409 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.167:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.283637 kubelet[1682]: I1213 03:38:41.283600 1682 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:38:41.310509 kubelet[1682]: I1213 03:38:41.310434 1682 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:38:41.310941 kubelet[1682]: I1213 03:38:41.310894 1682 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:38:41.311357 kubelet[1682]: I1213 03:38:41.311284 1682 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:38:41.311566 kubelet[1682]: I1213 03:38:41.311363 1682 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:38:41.311566 kubelet[1682]: I1213 03:38:41.311390 1682 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:38:41.311732 kubelet[1682]: I1213 03:38:41.311572 1682 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:38:41.311732 kubelet[1682]: I1213 03:38:41.311730 1682 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:38:41.311862 kubelet[1682]: I1213 03:38:41.311762 1682 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:38:41.311862 kubelet[1682]: I1213 03:38:41.311808 1682 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:38:41.311862 kubelet[1682]: I1213 03:38:41.311835 1682 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:38:41.318410 kubelet[1682]: I1213 03:38:41.318374 1682 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:38:41.331914 kubelet[1682]: I1213 03:38:41.331859 1682 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:38:41.332321 kubelet[1682]: W1213 03:38:41.332294 1682 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 03:38:41.333765 kubelet[1682]: I1213 03:38:41.333733 1682 server.go:1256] "Started kubelet" Dec 13 03:38:41.334338 kubelet[1682]: W1213 03:38:41.334258 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.24.4.167:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.334553 kubelet[1682]: E1213 03:38:41.334527 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.167:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.334887 kubelet[1682]: W1213 03:38:41.334819 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.24.4.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-5-2a90ac038f.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.335142 kubelet[1682]: E1213 03:38:41.335114 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-5-2a90ac038f.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.340813 kubelet[1682]: I1213 03:38:41.339290 1682 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:38:41.341180 kubelet[1682]: I1213 03:38:41.341134 1682 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:38:41.357939 kernel: kauditd_printk_skb: 374 callbacks suppressed Dec 13 03:38:41.358164 kernel: audit: type=1400 audit(1734061121.344:333): avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:41.344000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:41.358384 kubelet[1682]: I1213 03:38:41.346088 1682 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:38:41.358384 kubelet[1682]: I1213 03:38:41.346179 1682 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:38:41.358384 kubelet[1682]: I1213 03:38:41.346316 1682 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:38:41.358946 kubelet[1682]: I1213 03:38:41.358904 1682 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:38:41.359455 kubelet[1682]: I1213 03:38:41.359356 1682 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:38:41.359719 kubelet[1682]: I1213 03:38:41.359689 1682 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:38:41.344000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:41.367364 kubelet[1682]: I1213 03:38:41.366063 1682 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:38:41.367364 kubelet[1682]: I1213 03:38:41.366171 1682 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:38:41.369350 kernel: audit: type=1401 audit(1734061121.344:333): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:41.344000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b4db90 a1=c000c64210 a2=c000b4db60 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.370287 kubelet[1682]: E1213 03:38:41.370252 1682 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.167:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.167:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-5-2a90ac038f.novalocal.18109f6703e90058 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-5-2a90ac038f.novalocal,UID:ci-3510-3-6-5-2a90ac038f.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-5-2a90ac038f.novalocal,},FirstTimestamp:2024-12-13 03:38:41.333690456 +0000 UTC m=+1.141045892,LastTimestamp:2024-12-13 03:38:41.333690456 +0000 UTC m=+1.141045892,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-5-2a90ac038f.novalocal,}" Dec 13 03:38:41.374015 kubelet[1682]: E1213 03:38:41.373944 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-5-2a90ac038f.novalocal?timeout=10s\": dial tcp 172.24.4.167:6443: connect: connection refused" interval="200ms" Dec 13 03:38:41.374471 kubelet[1682]: I1213 03:38:41.374435 1682 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:38:41.374807 kubelet[1682]: I1213 03:38:41.374763 1682 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:38:41.376043 kernel: audit: type=1300 audit(1734061121.344:333): arch=c000003e syscall=188 success=no exit=-22 a0=c000b4db90 a1=c000c64210 a2=c000b4db60 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.376221 kernel: audit: type=1327 audit(1734061121.344:333): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:41.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:41.379079 kubelet[1682]: I1213 03:38:41.379044 1682 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:38:41.380381 kubelet[1682]: W1213 03:38:41.380307 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.24.4.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.380651 kubelet[1682]: E1213 03:38:41.380597 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.345000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:41.383485 kubelet[1682]: E1213 03:38:41.383455 1682 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:38:41.345000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:41.386801 kernel: audit: type=1400 audit(1734061121.345:334): avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:41.386902 kernel: audit: type=1401 audit(1734061121.345:334): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:41.387061 kernel: audit: type=1300 audit(1734061121.345:334): arch=c000003e syscall=188 success=no exit=-22 a0=c000b659c0 a1=c000c64228 a2=c000b4dc20 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.345000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b659c0 a1=c000c64228 a2=c000b4dc20 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:41.348000 audit[1692]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.403104 kernel: audit: type=1327 audit(1734061121.345:334): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:41.403181 kernel: audit: type=1325 audit(1734061121.348:335): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.348000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff552d7930 a2=0 a3=7fff552d791c items=0 ppid=1682 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.412787 kernel: audit: type=1300 audit(1734061121.348:335): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff552d7930 a2=0 a3=7fff552d791c items=0 ppid=1682 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:38:41.348000 audit[1693]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.348000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd03c59d0 a2=0 a3=7ffdd03c59bc items=0 ppid=1682 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:38:41.361000 audit[1695]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.361000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef996f2c0 a2=0 a3=7ffef996f2ac items=0 ppid=1682 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:38:41.366000 audit[1697]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.366000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff04e8270 a2=0 a3=7ffff04e825c items=0 ppid=1682 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:38:41.413000 audit[1704]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.413000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe9cc6f660 a2=0 a3=7ffe9cc6f64c items=0 ppid=1682 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 03:38:41.415366 kubelet[1682]: I1213 03:38:41.415345 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:38:41.415000 audit[1706]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:38:41.415000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe164aed00 a2=0 a3=7ffe164aecec items=0 ppid=1682 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 03:38:41.417324 kubelet[1682]: I1213 03:38:41.417310 1682 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:38:41.417438 kubelet[1682]: I1213 03:38:41.417426 1682 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:38:41.417539 kubelet[1682]: I1213 03:38:41.417527 1682 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:38:41.417677 kubelet[1682]: E1213 03:38:41.417656 1682 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 03:38:41.417000 audit[1705]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.417000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4ea2ac70 a2=0 a3=7ffc4ea2ac5c items=0 ppid=1682 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:38:41.418000 audit[1709]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.418000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd487614c0 a2=0 a3=7ffd487614ac items=0 ppid=1682 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:38:41.418000 audit[1707]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:38:41.418000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdea9aab70 a2=0 a3=7ffdea9aab5c items=0 ppid=1682 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 03:38:41.419000 audit[1710]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:38:41.419000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdf1e07380 a2=0 a3=7ffdf1e0736c items=0 ppid=1682 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 03:38:41.420000 audit[1712]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:38:41.420000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc030fab50 a2=0 a3=7ffc030fab3c items=0 ppid=1682 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:38:41.421000 audit[1711]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:38:41.421000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec3adf520 a2=0 a3=7ffec3adf50c items=0 ppid=1682 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 03:38:41.423236 kubelet[1682]: W1213 03:38:41.423174 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.24.4.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.423299 kubelet[1682]: E1213 03:38:41.423251 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:41.424103 kubelet[1682]: I1213 03:38:41.424088 1682 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:38:41.424176 kubelet[1682]: I1213 03:38:41.424167 1682 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:38:41.424252 kubelet[1682]: I1213 03:38:41.424242 1682 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:38:41.430602 kubelet[1682]: I1213 03:38:41.430588 1682 policy_none.go:49] "None policy: Start" Dec 13 03:38:41.431356 kubelet[1682]: I1213 03:38:41.431343 1682 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:38:41.431436 kubelet[1682]: I1213 03:38:41.431427 1682 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:38:41.441329 systemd[1]: Created slice kubepods.slice. Dec 13 03:38:41.446349 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 03:38:41.449457 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 03:38:41.454716 kubelet[1682]: I1213 03:38:41.454692 1682 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:38:41.453000 audit[1682]: AVC avc: denied { mac_admin } for pid=1682 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:41.453000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:41.453000 audit[1682]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000788bd0 a1=c000cda8e8 a2=c000788b70 a3=25 items=0 ppid=1 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:41.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:41.454971 kubelet[1682]: I1213 03:38:41.454761 1682 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:38:41.454971 kubelet[1682]: I1213 03:38:41.454933 1682 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:38:41.456954 kubelet[1682]: E1213 03:38:41.456938 1682 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-5-2a90ac038f.novalocal\" not found" Dec 13 03:38:41.461057 kubelet[1682]: I1213 03:38:41.461030 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.461426 kubelet[1682]: E1213 03:38:41.461412 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.167:6443/api/v1/nodes\": dial tcp 172.24.4.167:6443: connect: connection refused" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.522752 kubelet[1682]: I1213 03:38:41.518032 1682 topology_manager.go:215] "Topology Admit Handler" podUID="acfe49b77682653930d630abf22c225d" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.523412 kubelet[1682]: I1213 03:38:41.523302 1682 topology_manager.go:215] "Topology Admit Handler" podUID="cf1a45d3232b68827b7740aa941538e4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.526470 kubelet[1682]: I1213 03:38:41.526420 1682 topology_manager.go:215] "Topology Admit Handler" podUID="fa5314b13152d65ebb6fc866d9cd9923" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.534044 systemd[1]: Created slice kubepods-burstable-podacfe49b77682653930d630abf22c225d.slice. Dec 13 03:38:41.544034 systemd[1]: Created slice kubepods-burstable-podcf1a45d3232b68827b7740aa941538e4.slice. Dec 13 03:38:41.548831 systemd[1]: Created slice kubepods-burstable-podfa5314b13152d65ebb6fc866d9cd9923.slice. Dec 13 03:38:41.566672 kubelet[1682]: I1213 03:38:41.566626 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.566672 kubelet[1682]: I1213 03:38:41.566676 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fa5314b13152d65ebb6fc866d9cd9923-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"fa5314b13152d65ebb6fc866d9cd9923\") " pod="kube-system/kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.566905 kubelet[1682]: I1213 03:38:41.566704 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.566905 kubelet[1682]: I1213 03:38:41.566732 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.566905 kubelet[1682]: I1213 03:38:41.566757 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.566905 kubelet[1682]: I1213 03:38:41.566780 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.567256 kubelet[1682]: I1213 03:38:41.566804 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.567256 kubelet[1682]: I1213 03:38:41.566828 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.567256 kubelet[1682]: I1213 03:38:41.566859 1682 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.575080 kubelet[1682]: E1213 03:38:41.575049 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-5-2a90ac038f.novalocal?timeout=10s\": dial tcp 172.24.4.167:6443: connect: connection refused" interval="400ms" Dec 13 03:38:41.665295 kubelet[1682]: I1213 03:38:41.665161 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.666128 kubelet[1682]: E1213 03:38:41.666076 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.167:6443/api/v1/nodes\": dial tcp 172.24.4.167:6443: connect: connection refused" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:41.848206 env[1140]: time="2024-12-13T03:38:41.847397645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:acfe49b77682653930d630abf22c225d,Namespace:kube-system,Attempt:0,}" Dec 13 03:38:41.852695 env[1140]: time="2024-12-13T03:38:41.852379591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:cf1a45d3232b68827b7740aa941538e4,Namespace:kube-system,Attempt:0,}" Dec 13 03:38:41.853543 env[1140]: time="2024-12-13T03:38:41.853319588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:fa5314b13152d65ebb6fc866d9cd9923,Namespace:kube-system,Attempt:0,}" Dec 13 03:38:41.976883 kubelet[1682]: E1213 03:38:41.976805 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-5-2a90ac038f.novalocal?timeout=10s\": dial tcp 172.24.4.167:6443: connect: connection refused" interval="800ms" Dec 13 03:38:42.070726 kubelet[1682]: I1213 03:38:42.070243 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:42.071087 kubelet[1682]: E1213 03:38:42.071032 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.167:6443/api/v1/nodes\": dial tcp 172.24.4.167:6443: connect: connection refused" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:42.686694 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1724192180.mount: Deactivated successfully. Dec 13 03:38:42.693025 kubelet[1682]: W1213 03:38:42.692870 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.24.4.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.693025 kubelet[1682]: E1213 03:38:42.692946 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.167:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.693929 kubelet[1682]: W1213 03:38:42.693773 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.24.4.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-5-2a90ac038f.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.693929 kubelet[1682]: E1213 03:38:42.693890 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.167:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-5-2a90ac038f.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.705214 env[1140]: time="2024-12-13T03:38:42.705144308Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.710455 env[1140]: time="2024-12-13T03:38:42.710373588Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.715098 env[1140]: time="2024-12-13T03:38:42.714968164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.717616 env[1140]: time="2024-12-13T03:38:42.717534017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.723885 env[1140]: time="2024-12-13T03:38:42.723822447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.728174 kubelet[1682]: W1213 03:38:42.728023 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.24.4.167:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.728174 kubelet[1682]: E1213 03:38:42.728137 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.167:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.728865 env[1140]: time="2024-12-13T03:38:42.728804502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.737159 env[1140]: time="2024-12-13T03:38:42.737098913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.740403 env[1140]: time="2024-12-13T03:38:42.740351687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.744948 env[1140]: time="2024-12-13T03:38:42.743419624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.745502 env[1140]: time="2024-12-13T03:38:42.745436524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.748573 env[1140]: time="2024-12-13T03:38:42.748527023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.751890 env[1140]: time="2024-12-13T03:38:42.751815826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:38:42.757029 kubelet[1682]: W1213 03:38:42.756802 1682 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.24.4.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.757029 kubelet[1682]: E1213 03:38:42.756942 1682 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.167:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:42.778396 kubelet[1682]: E1213 03:38:42.778339 1682 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.167:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-5-2a90ac038f.novalocal?timeout=10s\": dial tcp 172.24.4.167:6443: connect: connection refused" interval="1.6s" Dec 13 03:38:42.801568 env[1140]: time="2024-12-13T03:38:42.801186837Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:38:42.801568 env[1140]: time="2024-12-13T03:38:42.801275103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:38:42.801568 env[1140]: time="2024-12-13T03:38:42.801308897Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:38:42.802468 env[1140]: time="2024-12-13T03:38:42.802305350Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f pid=1720 runtime=io.containerd.runc.v2 Dec 13 03:38:42.839215 systemd[1]: Started cri-containerd-3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f.scope. Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.854000 audit: BPF prog-id=58 op=LOAD Dec 13 03:38:42.855000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.855000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1720 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343933383661613533633335346237656266626230623166643336 Dec 13 03:38:42.855000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.855000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1720 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343933383661613533633335346237656266626230623166643336 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.856000 audit: BPF prog-id=59 op=LOAD Dec 13 03:38:42.856000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c0bf0 items=0 ppid=1720 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343933383661613533633335346237656266626230623166643336 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.857000 audit: BPF prog-id=60 op=LOAD Dec 13 03:38:42.857000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c0c38 items=0 ppid=1720 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343933383661613533633335346237656266626230623166643336 Dec 13 03:38:42.859000 audit: BPF prog-id=60 op=UNLOAD Dec 13 03:38:42.859000 audit: BPF prog-id=59 op=UNLOAD Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.859000 audit: BPF prog-id=61 op=LOAD Dec 13 03:38:42.859000 audit[1729]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c1048 items=0 ppid=1720 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364343933383661613533633335346237656266626230623166643336 Dec 13 03:38:42.871023 env[1140]: time="2024-12-13T03:38:42.864237192Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:38:42.871023 env[1140]: time="2024-12-13T03:38:42.864337611Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:38:42.871023 env[1140]: time="2024-12-13T03:38:42.864385531Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:38:42.871023 env[1140]: time="2024-12-13T03:38:42.865135861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ec6bb37c0d347fcbd09c5779a00c845508079eb0a5313ea0eb0074fd86ecabf pid=1762 runtime=io.containerd.runc.v2 Dec 13 03:38:42.880419 kubelet[1682]: I1213 03:38:42.875841 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:42.880419 kubelet[1682]: E1213 03:38:42.880386 1682 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.167:6443/api/v1/nodes\": dial tcp 172.24.4.167:6443: connect: connection refused" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:42.891867 env[1140]: time="2024-12-13T03:38:42.891772500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:38:42.892124 env[1140]: time="2024-12-13T03:38:42.892098493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:38:42.892252 env[1140]: time="2024-12-13T03:38:42.892213448Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:38:42.892525 env[1140]: time="2024-12-13T03:38:42.892449903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78cd6dce38707ca7f394dcbed4d63b1adf5bddeac68ccd4fbb76f3205de4ff20 pid=1755 runtime=io.containerd.runc.v2 Dec 13 03:38:42.895282 systemd[1]: Started cri-containerd-7ec6bb37c0d347fcbd09c5779a00c845508079eb0a5313ea0eb0074fd86ecabf.scope. Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.909000 audit: BPF prog-id=62 op=LOAD Dec 13 03:38:42.914000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.914000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1762 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765633662623337633064333437666362643039633537373961303063 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1762 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765633662623337633064333437666362643039633537373961303063 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit: BPF prog-id=63 op=LOAD Dec 13 03:38:42.915000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035ed30 items=0 ppid=1762 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765633662623337633064333437666362643039633537373961303063 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.915000 audit: BPF prog-id=64 op=LOAD Dec 13 03:38:42.915000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00035ed78 items=0 ppid=1762 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765633662623337633064333437666362643039633537373961303063 Dec 13 03:38:42.916000 audit: BPF prog-id=64 op=UNLOAD Dec 13 03:38:42.916000 audit: BPF prog-id=63 op=UNLOAD Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.916000 audit: BPF prog-id=65 op=LOAD Dec 13 03:38:42.916000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035f188 items=0 ppid=1762 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765633662623337633064333437666362643039633537373961303063 Dec 13 03:38:42.935080 systemd[1]: Started cri-containerd-78cd6dce38707ca7f394dcbed4d63b1adf5bddeac68ccd4fbb76f3205de4ff20.scope. Dec 13 03:38:42.942066 env[1140]: time="2024-12-13T03:38:42.939921043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:fa5314b13152d65ebb6fc866d9cd9923,Namespace:kube-system,Attempt:0,} returns sandbox id \"3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f\"" Dec 13 03:38:42.950008 env[1140]: time="2024-12-13T03:38:42.948538962Z" level=info msg="CreateContainer within sandbox \"3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.953000 audit: BPF prog-id=66 op=LOAD Dec 13 03:38:42.955000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.955000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1755 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636436646365333837303763613766333934646362656434643633 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1755 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636436646365333837303763613766333934646362656434643633 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.958000 audit: BPF prog-id=67 op=LOAD Dec 13 03:38:42.958000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000397800 items=0 ppid=1755 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636436646365333837303763613766333934646362656434643633 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit: BPF prog-id=68 op=LOAD Dec 13 03:38:42.959000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000397848 items=0 ppid=1755 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636436646365333837303763613766333934646362656434643633 Dec 13 03:38:42.959000 audit: BPF prog-id=68 op=UNLOAD Dec 13 03:38:42.959000 audit: BPF prog-id=67 op=UNLOAD Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:42.959000 audit: BPF prog-id=69 op=LOAD Dec 13 03:38:42.959000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000397c58 items=0 ppid=1755 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:42.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738636436646365333837303763613766333934646362656434643633 Dec 13 03:38:42.983447 env[1140]: time="2024-12-13T03:38:42.983399589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:cf1a45d3232b68827b7740aa941538e4,Namespace:kube-system,Attempt:0,} returns sandbox id \"7ec6bb37c0d347fcbd09c5779a00c845508079eb0a5313ea0eb0074fd86ecabf\"" Dec 13 03:38:42.984771 env[1140]: time="2024-12-13T03:38:42.984710183Z" level=info msg="CreateContainer within sandbox \"3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"dc28ffbe460fd2a23e54ea61ca6d96449bac9de6bc3a6a155a6c357c9a71c3c6\"" Dec 13 03:38:42.986832 env[1140]: time="2024-12-13T03:38:42.986791095Z" level=info msg="StartContainer for \"dc28ffbe460fd2a23e54ea61ca6d96449bac9de6bc3a6a155a6c357c9a71c3c6\"" Dec 13 03:38:42.988229 env[1140]: time="2024-12-13T03:38:42.988090106Z" level=info msg="CreateContainer within sandbox \"7ec6bb37c0d347fcbd09c5779a00c845508079eb0a5313ea0eb0074fd86ecabf\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 03:38:43.011412 env[1140]: time="2024-12-13T03:38:43.011361817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal,Uid:acfe49b77682653930d630abf22c225d,Namespace:kube-system,Attempt:0,} returns sandbox id \"78cd6dce38707ca7f394dcbed4d63b1adf5bddeac68ccd4fbb76f3205de4ff20\"" Dec 13 03:38:43.014954 env[1140]: time="2024-12-13T03:38:43.014908913Z" level=info msg="CreateContainer within sandbox \"78cd6dce38707ca7f394dcbed4d63b1adf5bddeac68ccd4fbb76f3205de4ff20\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 03:38:43.022700 systemd[1]: Started cri-containerd-dc28ffbe460fd2a23e54ea61ca6d96449bac9de6bc3a6a155a6c357c9a71c3c6.scope. Dec 13 03:38:43.027906 env[1140]: time="2024-12-13T03:38:43.027850697Z" level=info msg="CreateContainer within sandbox \"7ec6bb37c0d347fcbd09c5779a00c845508079eb0a5313ea0eb0074fd86ecabf\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c250c8258c5262bcfb445ae2c4e20bef4cd7a941e966fb3c32b3e10327284efd\"" Dec 13 03:38:43.029081 env[1140]: time="2024-12-13T03:38:43.029055540Z" level=info msg="StartContainer for \"c250c8258c5262bcfb445ae2c4e20bef4cd7a941e966fb3c32b3e10327284efd\"" Dec 13 03:38:43.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.044000 audit: BPF prog-id=70 op=LOAD Dec 13 03:38:43.047000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.047000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1720 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323866666265343630666432613233653534656136316361366439 Dec 13 03:38:43.047000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.047000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1720 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323866666265343630666432613233653534656136316361366439 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit: BPF prog-id=71 op=LOAD Dec 13 03:38:43.048000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00038d200 items=0 ppid=1720 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323866666265343630666432613233653534656136316361366439 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.048000 audit: BPF prog-id=72 op=LOAD Dec 13 03:38:43.048000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00038d248 items=0 ppid=1720 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323866666265343630666432613233653534656136316361366439 Dec 13 03:38:43.049000 audit: BPF prog-id=72 op=UNLOAD Dec 13 03:38:43.049000 audit: BPF prog-id=71 op=UNLOAD Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.050000 audit: BPF prog-id=73 op=LOAD Dec 13 03:38:43.050000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00038d658 items=0 ppid=1720 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463323866666265343630666432613233653534656136316361366439 Dec 13 03:38:43.058027 systemd[1]: Started cri-containerd-c250c8258c5262bcfb445ae2c4e20bef4cd7a941e966fb3c32b3e10327284efd.scope. Dec 13 03:38:43.066935 env[1140]: time="2024-12-13T03:38:43.066874448Z" level=info msg="CreateContainer within sandbox \"78cd6dce38707ca7f394dcbed4d63b1adf5bddeac68ccd4fbb76f3205de4ff20\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"502a4709dfc6454f6cb4595a1ed45adb4d7dd75dd5feae2e6c8e73ef836a6635\"" Dec 13 03:38:43.068098 env[1140]: time="2024-12-13T03:38:43.068063904Z" level=info msg="StartContainer for \"502a4709dfc6454f6cb4595a1ed45adb4d7dd75dd5feae2e6c8e73ef836a6635\"" Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.089000 audit: BPF prog-id=74 op=LOAD Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1762 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332353063383235386335323632626366623434356165326334653230 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1762 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332353063383235386335323632626366623434356165326334653230 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.090000 audit: BPF prog-id=75 op=LOAD Dec 13 03:38:43.090000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000336150 items=0 ppid=1762 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332353063383235386335323632626366623434356165326334653230 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit: BPF prog-id=76 op=LOAD Dec 13 03:38:43.091000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000336198 items=0 ppid=1762 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332353063383235386335323632626366623434356165326334653230 Dec 13 03:38:43.091000 audit: BPF prog-id=76 op=UNLOAD Dec 13 03:38:43.091000 audit: BPF prog-id=75 op=UNLOAD Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.091000 audit: BPF prog-id=77 op=LOAD Dec 13 03:38:43.091000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003365a8 items=0 ppid=1762 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332353063383235386335323632626366623434356165326334653230 Dec 13 03:38:43.095007 systemd[1]: Started cri-containerd-502a4709dfc6454f6cb4595a1ed45adb4d7dd75dd5feae2e6c8e73ef836a6635.scope. Dec 13 03:38:43.121493 env[1140]: time="2024-12-13T03:38:43.121445069Z" level=info msg="StartContainer for \"dc28ffbe460fd2a23e54ea61ca6d96449bac9de6bc3a6a155a6c357c9a71c3c6\" returns successfully" Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.125000 audit: BPF prog-id=78 op=LOAD Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1755 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530326134373039646663363435346636636234353935613165643435 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1755 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530326134373039646663363435346636636234353935613165643435 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.126000 audit: BPF prog-id=79 op=LOAD Dec 13 03:38:43.126000 audit[1896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002104f0 items=0 ppid=1755 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530326134373039646663363435346636636234353935613165643435 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.127000 audit: BPF prog-id=80 op=LOAD Dec 13 03:38:43.127000 audit[1896]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000210538 items=0 ppid=1755 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530326134373039646663363435346636636234353935613165643435 Dec 13 03:38:43.133000 audit: BPF prog-id=80 op=UNLOAD Dec 13 03:38:43.134000 audit: BPF prog-id=79 op=UNLOAD Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { perfmon } for pid=1896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit[1896]: AVC avc: denied { bpf } for pid=1896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:43.134000 audit: BPF prog-id=81 op=LOAD Dec 13 03:38:43.134000 audit[1896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000210948 items=0 ppid=1755 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:43.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530326134373039646663363435346636636234353935613165643435 Dec 13 03:38:43.153375 env[1140]: time="2024-12-13T03:38:43.153313223Z" level=info msg="StartContainer for \"c250c8258c5262bcfb445ae2c4e20bef4cd7a941e966fb3c32b3e10327284efd\" returns successfully" Dec 13 03:38:43.189864 env[1140]: time="2024-12-13T03:38:43.189815356Z" level=info msg="StartContainer for \"502a4709dfc6454f6cb4595a1ed45adb4d7dd75dd5feae2e6c8e73ef836a6635\" returns successfully" Dec 13 03:38:43.305423 kubelet[1682]: E1213 03:38:43.305311 1682 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.167:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.167:6443: connect: connection refused Dec 13 03:38:43.656541 systemd[1]: run-containerd-runc-k8s.io-3d49386aa53c354b7ebfbb0b1fd36910ffc161d079ada3c0651d2bc3445b1c7f-runc.iL39NP.mount: Deactivated successfully. Dec 13 03:38:44.482465 kubelet[1682]: I1213 03:38:44.482441 1682 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:44.917000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:44.917000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005b44e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:44.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:44.917000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:44.917000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000654580 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:44.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:45.567000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.567000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005180690 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.567000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.567000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006215e80 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.568000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.568000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0062b5050 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.568000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.576000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526907 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.576000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c005180ed0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.576000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.577000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.577000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0027f1e40 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.577000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:45.577000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0062b5530 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:38:45.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:38:45.709653 kubelet[1682]: E1213 03:38:45.709599 1682 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-5-2a90ac038f.novalocal\" not found" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:45.777680 kubelet[1682]: I1213 03:38:45.777636 1682 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:46.317670 kubelet[1682]: I1213 03:38:46.317627 1682 apiserver.go:52] "Watching apiserver" Dec 13 03:38:46.366449 kubelet[1682]: I1213 03:38:46.366409 1682 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:38:48.949000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.953593 kernel: kauditd_printk_skb: 404 callbacks suppressed Dec 13 03:38:48.953737 kernel: audit: type=1400 audit(1734061128.949:464): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.949000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c98f00 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.973053 kernel: audit: type=1300 audit(1734061128.949:464): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c98f00 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:48.982042 kernel: audit: type=1327 audit(1734061128.949:464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:48.982198 kernel: audit: type=1400 audit(1734061128.952:465): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.952000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.952000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000db0100 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.995036 kernel: audit: type=1300 audit(1734061128.952:465): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000db0100 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:49.001029 kernel: audit: type=1327 audit(1734061128.952:465): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:48.952000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:49.011012 kernel: audit: type=1400 audit(1734061128.952:466): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.952000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000db02c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:49.018013 kernel: audit: type=1300 audit(1734061128.952:466): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000db02c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:48.952000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:49.029798 kernel: audit: type=1327 audit(1734061128.952:466): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:49.029930 kernel: audit: type=1400 audit(1734061128.952:467): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:38:48.952000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000db0480 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:38:48.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:38:49.098143 systemd[1]: Reloading. Dec 13 03:38:49.210619 /usr/lib/systemd/system-generators/torcx-generator[1968]: time="2024-12-13T03:38:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 03:38:49.210655 /usr/lib/systemd/system-generators/torcx-generator[1968]: time="2024-12-13T03:38:49Z" level=info msg="torcx already run" Dec 13 03:38:49.318987 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 03:38:49.319008 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 03:38:49.343421 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit: BPF prog-id=82 op=LOAD Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.448000 audit: BPF prog-id=83 op=LOAD Dec 13 03:38:49.448000 audit: BPF prog-id=43 op=UNLOAD Dec 13 03:38:49.448000 audit: BPF prog-id=44 op=UNLOAD Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.450000 audit: BPF prog-id=84 op=LOAD Dec 13 03:38:49.450000 audit: BPF prog-id=45 op=UNLOAD Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.451000 audit: BPF prog-id=85 op=LOAD Dec 13 03:38:49.451000 audit: BPF prog-id=46 op=UNLOAD Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.452000 audit: BPF prog-id=86 op=LOAD Dec 13 03:38:49.452000 audit: BPF prog-id=74 op=UNLOAD Dec 13 03:38:49.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.457000 audit: BPF prog-id=87 op=LOAD Dec 13 03:38:49.457000 audit: BPF prog-id=58 op=UNLOAD Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.459000 audit: BPF prog-id=88 op=LOAD Dec 13 03:38:49.459000 audit: BPF prog-id=47 op=UNLOAD Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.461000 audit: BPF prog-id=89 op=LOAD Dec 13 03:38:49.461000 audit: BPF prog-id=70 op=UNLOAD Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit: BPF prog-id=90 op=LOAD Dec 13 03:38:49.464000 audit: BPF prog-id=48 op=UNLOAD Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.464000 audit: BPF prog-id=91 op=LOAD Dec 13 03:38:49.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.465000 audit: BPF prog-id=92 op=LOAD Dec 13 03:38:49.465000 audit: BPF prog-id=49 op=UNLOAD Dec 13 03:38:49.465000 audit: BPF prog-id=50 op=UNLOAD Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit: BPF prog-id=93 op=LOAD Dec 13 03:38:49.467000 audit: BPF prog-id=51 op=UNLOAD Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit: BPF prog-id=94 op=LOAD Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.468000 audit: BPF prog-id=95 op=LOAD Dec 13 03:38:49.468000 audit: BPF prog-id=52 op=UNLOAD Dec 13 03:38:49.468000 audit: BPF prog-id=53 op=UNLOAD Dec 13 03:38:49.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit: BPF prog-id=96 op=LOAD Dec 13 03:38:49.471000 audit: BPF prog-id=62 op=UNLOAD Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.472000 audit: BPF prog-id=97 op=LOAD Dec 13 03:38:49.472000 audit: BPF prog-id=54 op=UNLOAD Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.473000 audit: BPF prog-id=98 op=LOAD Dec 13 03:38:49.474000 audit: BPF prog-id=66 op=UNLOAD Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit: BPF prog-id=99 op=LOAD Dec 13 03:38:49.475000 audit: BPF prog-id=78 op=UNLOAD Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit: BPF prog-id=100 op=LOAD Dec 13 03:38:49.476000 audit: BPF prog-id=55 op=UNLOAD Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit: BPF prog-id=101 op=LOAD Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:49.476000 audit: BPF prog-id=102 op=LOAD Dec 13 03:38:49.476000 audit: BPF prog-id=56 op=UNLOAD Dec 13 03:38:49.476000 audit: BPF prog-id=57 op=UNLOAD Dec 13 03:38:49.499163 systemd[1]: Stopping kubelet.service... Dec 13 03:38:49.502644 kubelet[1682]: I1213 03:38:49.499945 1682 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:38:49.524327 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 03:38:49.524542 systemd[1]: Stopped kubelet.service. Dec 13 03:38:49.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:49.524605 systemd[1]: kubelet.service: Consumed 1.682s CPU time. Dec 13 03:38:49.527264 systemd[1]: Starting kubelet.service... Dec 13 03:38:52.171724 systemd[1]: Started kubelet.service. Dec 13 03:38:52.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:52.307553 kubelet[2019]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:38:52.307915 kubelet[2019]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 03:38:52.308003 kubelet[2019]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 03:38:52.308147 kubelet[2019]: I1213 03:38:52.308119 2019 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 03:38:52.317601 kubelet[2019]: I1213 03:38:52.317574 2019 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 03:38:52.317761 kubelet[2019]: I1213 03:38:52.317750 2019 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 03:38:52.318110 kubelet[2019]: I1213 03:38:52.318093 2019 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 03:38:52.320545 kubelet[2019]: I1213 03:38:52.320525 2019 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 03:38:52.334238 kubelet[2019]: I1213 03:38:52.334211 2019 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 03:38:52.344103 kubelet[2019]: I1213 03:38:52.344057 2019 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 03:38:52.344492 kubelet[2019]: I1213 03:38:52.344479 2019 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 03:38:52.344772 kubelet[2019]: I1213 03:38:52.344754 2019 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 03:38:52.344942 kubelet[2019]: I1213 03:38:52.344930 2019 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 03:38:52.345049 kubelet[2019]: I1213 03:38:52.345039 2019 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 03:38:52.345136 kubelet[2019]: I1213 03:38:52.345125 2019 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:38:52.359725 kubelet[2019]: I1213 03:38:52.359703 2019 kubelet.go:396] "Attempting to sync node with API server" Dec 13 03:38:52.359862 kubelet[2019]: I1213 03:38:52.359850 2019 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 03:38:52.359958 kubelet[2019]: I1213 03:38:52.359948 2019 kubelet.go:312] "Adding apiserver pod source" Dec 13 03:38:52.367055 kubelet[2019]: I1213 03:38:52.367037 2019 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 03:38:52.368371 kubelet[2019]: I1213 03:38:52.368355 2019 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 03:38:52.368639 kubelet[2019]: I1213 03:38:52.368626 2019 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 03:38:52.369110 kubelet[2019]: I1213 03:38:52.369096 2019 server.go:1256] "Started kubelet" Dec 13 03:38:52.370000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:52.370000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:52.370000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007ddb60 a1=c0007a3428 a2=c0007ddb30 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:52.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:52.371893 kubelet[2019]: I1213 03:38:52.371879 2019 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 03:38:52.372019 kubelet[2019]: I1213 03:38:52.372005 2019 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 03:38:52.370000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:52.370000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:52.370000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00017b460 a1=c0007a3440 a2=c0007ddbf0 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:52.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:52.372252 kubelet[2019]: I1213 03:38:52.372241 2019 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 03:38:52.377338 kubelet[2019]: I1213 03:38:52.377316 2019 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 03:38:52.378615 kubelet[2019]: I1213 03:38:52.378598 2019 server.go:461] "Adding debug handlers to kubelet server" Dec 13 03:38:52.378740 kubelet[2019]: E1213 03:38:52.378721 2019 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 03:38:52.378847 kubelet[2019]: I1213 03:38:52.378832 2019 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 03:38:52.379088 kubelet[2019]: I1213 03:38:52.379070 2019 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 03:38:52.388273 kubelet[2019]: I1213 03:38:52.388250 2019 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 03:38:52.393372 kubelet[2019]: I1213 03:38:52.388420 2019 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 03:38:52.393670 kubelet[2019]: I1213 03:38:52.393610 2019 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 03:38:52.395086 kubelet[2019]: I1213 03:38:52.395068 2019 factory.go:221] Registration of the systemd container factory successfully Dec 13 03:38:52.395332 kubelet[2019]: I1213 03:38:52.395312 2019 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 03:38:52.399860 kubelet[2019]: I1213 03:38:52.399827 2019 factory.go:221] Registration of the containerd container factory successfully Dec 13 03:38:52.413120 kubelet[2019]: I1213 03:38:52.412949 2019 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 03:38:52.414197 kubelet[2019]: I1213 03:38:52.414159 2019 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 03:38:52.414197 kubelet[2019]: I1213 03:38:52.414188 2019 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 03:38:52.414596 kubelet[2019]: I1213 03:38:52.414208 2019 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 03:38:52.414596 kubelet[2019]: E1213 03:38:52.414259 2019 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 03:38:52.447759 kubelet[2019]: I1213 03:38:52.445253 2019 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 03:38:52.447905 kubelet[2019]: I1213 03:38:52.447893 2019 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 03:38:52.447993 kubelet[2019]: I1213 03:38:52.447966 2019 state_mem.go:36] "Initialized new in-memory state store" Dec 13 03:38:52.448230 kubelet[2019]: I1213 03:38:52.448220 2019 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 03:38:52.448314 kubelet[2019]: I1213 03:38:52.448304 2019 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 03:38:52.448374 kubelet[2019]: I1213 03:38:52.448366 2019 policy_none.go:49] "None policy: Start" Dec 13 03:38:52.449042 kubelet[2019]: I1213 03:38:52.449029 2019 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 03:38:52.449133 kubelet[2019]: I1213 03:38:52.449124 2019 state_mem.go:35] "Initializing new in-memory state store" Dec 13 03:38:52.449373 kubelet[2019]: I1213 03:38:52.449359 2019 state_mem.go:75] "Updated machine memory state" Dec 13 03:38:52.454093 kubelet[2019]: I1213 03:38:52.454076 2019 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 03:38:52.453000 audit[2019]: AVC avc: denied { mac_admin } for pid=2019 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:38:52.453000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 03:38:52.453000 audit[2019]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009c6690 a1=c001008558 a2=c0009c6660 a3=25 items=0 ppid=1 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:38:52.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 03:38:52.456220 kubelet[2019]: I1213 03:38:52.456192 2019 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 03:38:52.457689 kubelet[2019]: I1213 03:38:52.457668 2019 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 03:38:52.491492 kubelet[2019]: I1213 03:38:52.491459 2019 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.514625 kubelet[2019]: I1213 03:38:52.514589 2019 topology_manager.go:215] "Topology Admit Handler" podUID="acfe49b77682653930d630abf22c225d" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.514760 kubelet[2019]: I1213 03:38:52.514673 2019 topology_manager.go:215] "Topology Admit Handler" podUID="cf1a45d3232b68827b7740aa941538e4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.514760 kubelet[2019]: I1213 03:38:52.514712 2019 topology_manager.go:215] "Topology Admit Handler" podUID="fa5314b13152d65ebb6fc866d9cd9923" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.595488 kubelet[2019]: I1213 03:38:52.595439 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.595852 kubelet[2019]: I1213 03:38:52.595825 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.596144 kubelet[2019]: I1213 03:38:52.596107 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.596398 kubelet[2019]: I1213 03:38:52.596373 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fa5314b13152d65ebb6fc866d9cd9923-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"fa5314b13152d65ebb6fc866d9cd9923\") " pod="kube-system/kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.596699 kubelet[2019]: I1213 03:38:52.596669 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.596960 kubelet[2019]: I1213 03:38:52.596934 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.597240 kubelet[2019]: I1213 03:38:52.597214 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.597486 kubelet[2019]: I1213 03:38:52.597457 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cf1a45d3232b68827b7740aa941538e4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"cf1a45d3232b68827b7740aa941538e4\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.597702 kubelet[2019]: I1213 03:38:52.597679 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/acfe49b77682653930d630abf22c225d-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal\" (UID: \"acfe49b77682653930d630abf22c225d\") " pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.641444 kubelet[2019]: W1213 03:38:52.641364 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:38:52.936056 kubelet[2019]: W1213 03:38:52.935949 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:38:52.941534 kubelet[2019]: I1213 03:38:52.941484 2019 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.941918 kubelet[2019]: I1213 03:38:52.941864 2019 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:38:52.942331 kubelet[2019]: W1213 03:38:52.941603 2019 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 03:38:53.368121 kubelet[2019]: I1213 03:38:53.367915 2019 apiserver.go:52] "Watching apiserver" Dec 13 03:38:53.394686 kubelet[2019]: I1213 03:38:53.394626 2019 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 03:38:53.584872 kubelet[2019]: I1213 03:38:53.584792 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-5-2a90ac038f.novalocal" podStartSLOduration=1.584680571 podStartE2EDuration="1.584680571s" podCreationTimestamp="2024-12-13 03:38:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:38:53.582377919 +0000 UTC m=+1.358267200" watchObservedRunningTime="2024-12-13 03:38:53.584680571 +0000 UTC m=+1.360569842" Dec 13 03:38:53.662526 kubelet[2019]: I1213 03:38:53.662474 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-5-2a90ac038f.novalocal" podStartSLOduration=1.662343718 podStartE2EDuration="1.662343718s" podCreationTimestamp="2024-12-13 03:38:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:38:53.623463448 +0000 UTC m=+1.399352730" watchObservedRunningTime="2024-12-13 03:38:53.662343718 +0000 UTC m=+1.438232989" Dec 13 03:38:53.663154 kubelet[2019]: I1213 03:38:53.663121 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-5-2a90ac038f.novalocal" podStartSLOduration=1.663061597 podStartE2EDuration="1.663061597s" podCreationTimestamp="2024-12-13 03:38:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:38:53.658521953 +0000 UTC m=+1.434411234" watchObservedRunningTime="2024-12-13 03:38:53.663061597 +0000 UTC m=+1.438950868" Dec 13 03:38:57.528802 sudo[1324]: pam_unix(sudo:session): session closed for user root Dec 13 03:38:57.530035 kernel: kauditd_printk_skb: 260 callbacks suppressed Dec 13 03:38:57.530195 kernel: audit: type=1106 audit(1734061137.528:717): pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.528000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.529000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.555028 kernel: audit: type=1104 audit(1734061137.529:718): pid=1324 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.797357 sshd[1320]: pam_unix(sshd:session): session closed for user core Dec 13 03:38:57.800000 audit[1320]: USER_END pid=1320 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:57.801000 audit[1320]: CRED_DISP pid=1320 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:57.824086 systemd-logind[1133]: Session 9 logged out. Waiting for processes to exit. Dec 13 03:38:57.828105 systemd[1]: sshd@8-172.24.4.167:22-172.24.4.1:38218.service: Deactivated successfully. Dec 13 03:38:57.829794 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 03:38:57.832090 kernel: audit: type=1106 audit(1734061137.800:719): pid=1320 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:57.832353 kernel: audit: type=1104 audit(1734061137.801:720): pid=1320 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:38:57.832597 kernel: audit: type=1131 audit(1734061137.827:721): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.167:22-172.24.4.1:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.167:22-172.24.4.1:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:38:57.831541 systemd[1]: session-9.scope: Consumed 7.194s CPU time. Dec 13 03:38:57.835404 systemd-logind[1133]: Removed session 9. Dec 13 03:39:01.398000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526933 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 03:39:01.414094 kernel: audit: type=1400 audit(1734061141.398:722): avc: denied { watch } for pid=1888 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526933 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 03:39:01.398000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00115d140 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:01.432562 kernel: audit: type=1300 audit(1734061141.398:722): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00115d140 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:01.432770 kernel: audit: type=1327 audit(1734061141.398:722): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:01.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:02.486129 kubelet[2019]: I1213 03:39:02.486099 2019 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 03:39:02.486921 env[1140]: time="2024-12-13T03:39:02.486868545Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 03:39:02.487273 kubelet[2019]: I1213 03:39:02.487093 2019 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 03:39:02.941779 kubelet[2019]: I1213 03:39:02.941717 2019 topology_manager.go:215] "Topology Admit Handler" podUID="7995785b-f158-4173-9401-2a2a417f9815" podNamespace="kube-system" podName="kube-proxy-rh5kw" Dec 13 03:39:02.957169 systemd[1]: Created slice kubepods-besteffort-pod7995785b_f158_4173_9401_2a2a417f9815.slice. Dec 13 03:39:02.962551 kubelet[2019]: I1213 03:39:02.962498 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7995785b-f158-4173-9401-2a2a417f9815-kube-proxy\") pod \"kube-proxy-rh5kw\" (UID: \"7995785b-f158-4173-9401-2a2a417f9815\") " pod="kube-system/kube-proxy-rh5kw" Dec 13 03:39:02.962758 kubelet[2019]: I1213 03:39:02.962567 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7995785b-f158-4173-9401-2a2a417f9815-xtables-lock\") pod \"kube-proxy-rh5kw\" (UID: \"7995785b-f158-4173-9401-2a2a417f9815\") " pod="kube-system/kube-proxy-rh5kw" Dec 13 03:39:02.962758 kubelet[2019]: I1213 03:39:02.962640 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7995785b-f158-4173-9401-2a2a417f9815-lib-modules\") pod \"kube-proxy-rh5kw\" (UID: \"7995785b-f158-4173-9401-2a2a417f9815\") " pod="kube-system/kube-proxy-rh5kw" Dec 13 03:39:02.962758 kubelet[2019]: I1213 03:39:02.962686 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vb9j\" (UniqueName: \"kubernetes.io/projected/7995785b-f158-4173-9401-2a2a417f9815-kube-api-access-2vb9j\") pod \"kube-proxy-rh5kw\" (UID: \"7995785b-f158-4173-9401-2a2a417f9815\") " pod="kube-system/kube-proxy-rh5kw" Dec 13 03:39:03.281251 env[1140]: time="2024-12-13T03:39:03.278464914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rh5kw,Uid:7995785b-f158-4173-9401-2a2a417f9815,Namespace:kube-system,Attempt:0,}" Dec 13 03:39:03.626646 kubelet[2019]: I1213 03:39:03.626173 2019 topology_manager.go:215] "Topology Admit Handler" podUID="57ddb59b-3571-4d1b-8219-fb9fb7cbfba0" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-5vf4p" Dec 13 03:39:03.639845 systemd[1]: Created slice kubepods-besteffort-pod57ddb59b_3571_4d1b_8219_fb9fb7cbfba0.slice. Dec 13 03:39:03.725708 env[1140]: time="2024-12-13T03:39:03.725523454Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:39:03.726719 env[1140]: time="2024-12-13T03:39:03.726607919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:39:03.727017 env[1140]: time="2024-12-13T03:39:03.726665266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:39:03.727687 env[1140]: time="2024-12-13T03:39:03.727565426Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72 pid=2104 runtime=io.containerd.runc.v2 Dec 13 03:39:03.766563 kubelet[2019]: I1213 03:39:03.766459 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/57ddb59b-3571-4d1b-8219-fb9fb7cbfba0-var-lib-calico\") pod \"tigera-operator-c7ccbd65-5vf4p\" (UID: \"57ddb59b-3571-4d1b-8219-fb9fb7cbfba0\") " pod="tigera-operator/tigera-operator-c7ccbd65-5vf4p" Dec 13 03:39:03.766563 kubelet[2019]: I1213 03:39:03.766520 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rdr46\" (UniqueName: \"kubernetes.io/projected/57ddb59b-3571-4d1b-8219-fb9fb7cbfba0-kube-api-access-rdr46\") pod \"tigera-operator-c7ccbd65-5vf4p\" (UID: \"57ddb59b-3571-4d1b-8219-fb9fb7cbfba0\") " pod="tigera-operator/tigera-operator-c7ccbd65-5vf4p" Dec 13 03:39:03.781652 systemd[1]: Started cri-containerd-3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72.scope. Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.803549 kernel: audit: type=1400 audit(1734061143.795:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.803595 kernel: audit: type=1400 audit(1734061143.795:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.803618 kernel: audit: type=1400 audit(1734061143.795:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.811046 kernel: audit: type=1400 audit(1734061143.795:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.819448 kernel: audit: type=1400 audit(1734061143.795:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.819498 kernel: audit: type=1400 audit(1734061143.795:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.819522 kernel: audit: type=1400 audit(1734061143.795:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.827310 kernel: audit: type=1400 audit(1734061143.795:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.827381 kernel: audit: type=1400 audit(1734061143.795:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.806000 audit: BPF prog-id=103 op=LOAD Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2104 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313435666330363764613932343337666465646433653861636466 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2104 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313435666330363764613932343337666465646433653861636466 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.841250 kernel: audit: type=1400 audit(1734061143.806:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit: BPF prog-id=104 op=LOAD Dec 13 03:39:03.810000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018da40 items=0 ppid=2104 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313435666330363764613932343337666465646433653861636466 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit: BPF prog-id=105 op=LOAD Dec 13 03:39:03.810000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018da88 items=0 ppid=2104 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313435666330363764613932343337666465646433653861636466 Dec 13 03:39:03.810000 audit: BPF prog-id=105 op=UNLOAD Dec 13 03:39:03.810000 audit: BPF prog-id=104 op=UNLOAD Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.810000 audit: BPF prog-id=106 op=LOAD Dec 13 03:39:03.810000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018de98 items=0 ppid=2104 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365313435666330363764613932343337666465646433653861636466 Dec 13 03:39:03.855947 env[1140]: time="2024-12-13T03:39:03.855874077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rh5kw,Uid:7995785b-f158-4173-9401-2a2a417f9815,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72\"" Dec 13 03:39:03.859115 env[1140]: time="2024-12-13T03:39:03.859066057Z" level=info msg="CreateContainer within sandbox \"3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 03:39:03.889140 env[1140]: time="2024-12-13T03:39:03.889091012Z" level=info msg="CreateContainer within sandbox \"3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"329a2b946413472df4b78fc0cc540b6654dbf12a9a98fde71705f82a22d57894\"" Dec 13 03:39:03.890824 env[1140]: time="2024-12-13T03:39:03.890025165Z" level=info msg="StartContainer for \"329a2b946413472df4b78fc0cc540b6654dbf12a9a98fde71705f82a22d57894\"" Dec 13 03:39:03.907535 systemd[1]: Started cri-containerd-329a2b946413472df4b78fc0cc540b6654dbf12a9a98fde71705f82a22d57894.scope. Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe874202b58 items=0 ppid=2104 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396132623934363431333437326466346237386663306363353430 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.926000 audit: BPF prog-id=107 op=LOAD Dec 13 03:39:03.926000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bba8 items=0 ppid=2104 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396132623934363431333437326466346237386663306363353430 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit: BPF prog-id=108 op=LOAD Dec 13 03:39:03.927000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bbf8 items=0 ppid=2104 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396132623934363431333437326466346237386663306363353430 Dec 13 03:39:03.927000 audit: BPF prog-id=108 op=UNLOAD Dec 13 03:39:03.927000 audit: BPF prog-id=107 op=UNLOAD Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:03.927000 audit: BPF prog-id=109 op=LOAD Dec 13 03:39:03.927000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034bc88 items=0 ppid=2104 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:03.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396132623934363431333437326466346237386663306363353430 Dec 13 03:39:03.951168 env[1140]: time="2024-12-13T03:39:03.951108132Z" level=info msg="StartContainer for \"329a2b946413472df4b78fc0cc540b6654dbf12a9a98fde71705f82a22d57894\" returns successfully" Dec 13 03:39:03.954220 env[1140]: time="2024-12-13T03:39:03.954140161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-5vf4p,Uid:57ddb59b-3571-4d1b-8219-fb9fb7cbfba0,Namespace:tigera-operator,Attempt:0,}" Dec 13 03:39:03.988358 env[1140]: time="2024-12-13T03:39:03.988268466Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:39:03.988358 env[1140]: time="2024-12-13T03:39:03.988348957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:39:03.988636 env[1140]: time="2024-12-13T03:39:03.988381648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:39:03.989565 env[1140]: time="2024-12-13T03:39:03.988656824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0fb14e8d0148534d478a5e86d9e1b837cb2394cf74b766fa174ecdab75fe966 pid=2181 runtime=io.containerd.runc.v2 Dec 13 03:39:04.010234 systemd[1]: Started cri-containerd-b0fb14e8d0148534d478a5e86d9e1b837cb2394cf74b766fa174ecdab75fe966.scope. Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.024000 audit: BPF prog-id=110 op=LOAD Dec 13 03:39:04.027000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.027000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666231346538643031343835333464343738613565383664396531 Dec 13 03:39:04.027000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.027000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666231346538643031343835333464343738613565383664396531 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit: BPF prog-id=111 op=LOAD Dec 13 03:39:04.028000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021f040 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666231346538643031343835333464343738613565383664396531 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.028000 audit: BPF prog-id=112 op=LOAD Dec 13 03:39:04.028000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021f088 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666231346538643031343835333464343738613565383664396531 Dec 13 03:39:04.029000 audit: BPF prog-id=112 op=UNLOAD Dec 13 03:39:04.029000 audit: BPF prog-id=111 op=UNLOAD Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:04.029000 audit: BPF prog-id=113 op=LOAD Dec 13 03:39:04.029000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f498 items=0 ppid=2181 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230666231346538643031343835333464343738613565383664396531 Dec 13 03:39:04.071599 env[1140]: time="2024-12-13T03:39:04.071553301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-5vf4p,Uid:57ddb59b-3571-4d1b-8219-fb9fb7cbfba0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b0fb14e8d0148534d478a5e86d9e1b837cb2394cf74b766fa174ecdab75fe966\"" Dec 13 03:39:04.077269 env[1140]: time="2024-12-13T03:39:04.077243349Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 03:39:04.086535 systemd[1]: run-containerd-runc-k8s.io-3e145fc067da92437fdedd3e8acdf25ba06226dbae3fad5e0441dba16a396b72-runc.rh9dk2.mount: Deactivated successfully. Dec 13 03:39:04.224000 audit[2240]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.224000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5d3c49d0 a2=0 a3=7ffe5d3c49bc items=0 ppid=2156 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:39:04.229000 audit[2241]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.229000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd713bb8a0 a2=0 a3=7ffd713bb88c items=0 ppid=2156 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 03:39:04.234000 audit[2242]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.234000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0569e760 a2=0 a3=7ffc0569e74c items=0 ppid=2156 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:39:04.238000 audit[2244]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.238000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeadf9cad0 a2=0 a3=7ffeadf9cabc items=0 ppid=2156 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:39:04.242000 audit[2243]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.242000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff64f390b0 a2=0 a3=7fff64f3909c items=0 ppid=2156 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 03:39:04.253000 audit[2245]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.253000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe91c86c10 a2=0 a3=7ffe91c86bfc items=0 ppid=2156 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 03:39:04.342000 audit[2246]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.342000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe67bd9c30 a2=0 a3=7ffe67bd9c1c items=0 ppid=2156 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:39:04.348000 audit[2248]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.348000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdd7e6960 a2=0 a3=7fffdd7e694c items=0 ppid=2156 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 03:39:04.356000 audit[2251]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.356000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed5ec69c0 a2=0 a3=7ffed5ec69ac items=0 ppid=2156 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 03:39:04.357000 audit[2252]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.357000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6fe26bd0 a2=0 a3=7ffe6fe26bbc items=0 ppid=2156 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:39:04.360000 audit[2254]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.360000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4b1987a0 a2=0 a3=7fff4b19878c items=0 ppid=2156 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:39:04.361000 audit[2255]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.361000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4b48bab0 a2=0 a3=7ffe4b48ba9c items=0 ppid=2156 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:39:04.364000 audit[2257]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.364000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd29990e90 a2=0 a3=7ffd29990e7c items=0 ppid=2156 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:39:04.368000 audit[2260]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.368000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1d8ba360 a2=0 a3=7ffd1d8ba34c items=0 ppid=2156 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 03:39:04.369000 audit[2261]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.369000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec4f3ba10 a2=0 a3=7ffec4f3b9fc items=0 ppid=2156 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:39:04.372000 audit[2263]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.372000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeca2ac690 a2=0 a3=7ffeca2ac67c items=0 ppid=2156 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:39:04.374000 audit[2264]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.374000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd41eda3f0 a2=0 a3=7ffd41eda3dc items=0 ppid=2156 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:39:04.376000 audit[2266]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.376000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd283f6ac0 a2=0 a3=7ffd283f6aac items=0 ppid=2156 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:39:04.381000 audit[2269]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.381000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaae5aa20 a2=0 a3=7ffcaae5aa0c items=0 ppid=2156 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:39:04.385000 audit[2272]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.385000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1a64f8d0 a2=0 a3=7ffe1a64f8bc items=0 ppid=2156 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:39:04.386000 audit[2273]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.386000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe09190830 a2=0 a3=7ffe0919081c items=0 ppid=2156 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:39:04.392000 audit[2275]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.392000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe2d8578b0 a2=0 a3=7ffe2d85789c items=0 ppid=2156 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:39:04.397000 audit[2278]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.397000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc58e97250 a2=0 a3=7ffc58e9723c items=0 ppid=2156 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:39:04.398000 audit[2279]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.398000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda8ecaec0 a2=0 a3=7ffda8ecaeac items=0 ppid=2156 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:39:04.401000 audit[2281]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 03:39:04.401000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffce8e9a990 a2=0 a3=7ffce8e9a97c items=0 ppid=2156 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:39:04.429000 audit[2287]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:04.429000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc391cb900 a2=0 a3=7ffc391cb8ec items=0 ppid=2156 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:04.443000 audit[2287]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:04.443000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc391cb900 a2=0 a3=7ffc391cb8ec items=0 ppid=2156 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:04.447000 audit[2293]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.447000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffcb7d9d40 a2=0 a3=7fffcb7d9d2c items=0 ppid=2156 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 03:39:04.450000 audit[2295]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.450000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffb6b6c690 a2=0 a3=7fffb6b6c67c items=0 ppid=2156 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.450000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 03:39:04.456000 audit[2298]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.456000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6c8c7d60 a2=0 a3=7ffe6c8c7d4c items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 03:39:04.458000 audit[2299]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.458000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed47fe5f0 a2=0 a3=7ffed47fe5dc items=0 ppid=2156 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 03:39:04.460000 audit[2301]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.460000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4237c470 a2=0 a3=7ffd4237c45c items=0 ppid=2156 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 03:39:04.463000 audit[2302]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.463000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea72e9200 a2=0 a3=7ffea72e91ec items=0 ppid=2156 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 03:39:04.466000 audit[2304]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.466000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc336b5dd0 a2=0 a3=7ffc336b5dbc items=0 ppid=2156 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 03:39:04.472000 audit[2307]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.472000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe73da0940 a2=0 a3=7ffe73da092c items=0 ppid=2156 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 03:39:04.474000 audit[2308]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.474000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6161d070 a2=0 a3=7fff6161d05c items=0 ppid=2156 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 03:39:04.476000 audit[2310]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.476000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3950c0d0 a2=0 a3=7ffe3950c0bc items=0 ppid=2156 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 03:39:04.478000 audit[2311]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.478000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecc7ebdd0 a2=0 a3=7ffecc7ebdbc items=0 ppid=2156 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 03:39:04.480000 audit[2313]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.480000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd9d23950 a2=0 a3=7ffcd9d2393c items=0 ppid=2156 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 03:39:04.484000 audit[2316]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.484000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd57751020 a2=0 a3=7ffd5775100c items=0 ppid=2156 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 03:39:04.488000 audit[2319]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.488000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcae010270 a2=0 a3=7ffcae01025c items=0 ppid=2156 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 03:39:04.492000 audit[2320]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.492000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd40739b0 a2=0 a3=7ffdd407399c items=0 ppid=2156 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 03:39:04.498000 audit[2322]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.498000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc0143de40 a2=0 a3=7ffc0143de2c items=0 ppid=2156 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:39:04.505000 audit[2325]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.505000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda8fb8cc0 a2=0 a3=7ffda8fb8cac items=0 ppid=2156 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 03:39:04.507000 audit[2326]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.507000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9f6a29d0 a2=0 a3=7ffc9f6a29bc items=0 ppid=2156 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 03:39:04.510000 audit[2328]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.510000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff5bf3bdc0 a2=0 a3=7fff5bf3bdac items=0 ppid=2156 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 03:39:04.511000 audit[2329]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.511000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbca69d90 a2=0 a3=7ffdbca69d7c items=0 ppid=2156 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 03:39:04.513000 audit[2331]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.513000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffafd60d0 a2=0 a3=7ffffafd60bc items=0 ppid=2156 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:39:04.516000 audit[2334]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 03:39:04.516000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff519cd0c0 a2=0 a3=7fff519cd0ac items=0 ppid=2156 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 03:39:04.519000 audit[2336]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:39:04.519000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffff7ac6b40 a2=0 a3=7ffff7ac6b2c items=0 ppid=2156 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.519000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:04.520000 audit[2336]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 03:39:04.520000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff7ac6b40 a2=0 a3=7ffff7ac6b2c items=0 ppid=2156 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:04.520000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:09.575083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1316804533.mount: Deactivated successfully. Dec 13 03:39:11.498027 env[1140]: time="2024-12-13T03:39:11.497964212Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:11.501010 env[1140]: time="2024-12-13T03:39:11.500949804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:11.503953 env[1140]: time="2024-12-13T03:39:11.503927931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:11.506272 env[1140]: time="2024-12-13T03:39:11.506238246Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:11.507313 env[1140]: time="2024-12-13T03:39:11.507285120Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 03:39:11.511271 env[1140]: time="2024-12-13T03:39:11.511229661Z" level=info msg="CreateContainer within sandbox \"b0fb14e8d0148534d478a5e86d9e1b837cb2394cf74b766fa174ecdab75fe966\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 03:39:11.525114 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1926667261.mount: Deactivated successfully. Dec 13 03:39:11.537000 env[1140]: time="2024-12-13T03:39:11.536946008Z" level=info msg="CreateContainer within sandbox \"b0fb14e8d0148534d478a5e86d9e1b837cb2394cf74b766fa174ecdab75fe966\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fa94b8bb5a3c32bfbe3ac7636884286337c7f1c8faad017b0b5c29a996b32c90\"" Dec 13 03:39:11.537414 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1600450340.mount: Deactivated successfully. Dec 13 03:39:11.539361 env[1140]: time="2024-12-13T03:39:11.539001345Z" level=info msg="StartContainer for \"fa94b8bb5a3c32bfbe3ac7636884286337c7f1c8faad017b0b5c29a996b32c90\"" Dec 13 03:39:11.562621 systemd[1]: Started cri-containerd-fa94b8bb5a3c32bfbe3ac7636884286337c7f1c8faad017b0b5c29a996b32c90.scope. Dec 13 03:39:11.579008 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 03:39:11.579101 kernel: audit: type=1400 audit(1734061151.576:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.585797 kernel: audit: type=1400 audit(1734061151.576:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.585846 kernel: audit: type=1400 audit(1734061151.576:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.593047 kernel: audit: type=1400 audit(1734061151.576:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.593095 kernel: audit: type=1400 audit(1734061151.576:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.600318 kernel: audit: type=1400 audit(1734061151.576:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.600365 kernel: audit: type=1400 audit(1734061151.576:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.604891 kernel: audit: type=1400 audit(1734061151.576:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.612061 kernel: audit: type=1400 audit(1734061151.576:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.612124 kernel: audit: type=1400 audit(1734061151.577:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.577000 audit: BPF prog-id=114 op=LOAD Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2181 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:11.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393462386262356133633332626662653361633736333638383432 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2181 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:11.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393462386262356133633332626662653361633736333638383432 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit: BPF prog-id=115 op=LOAD Dec 13 03:39:11.584000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9af0 items=0 ppid=2181 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:11.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393462386262356133633332626662653361633736333638383432 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.584000 audit: BPF prog-id=116 op=LOAD Dec 13 03:39:11.584000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9b38 items=0 ppid=2181 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:11.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393462386262356133633332626662653361633736333638383432 Dec 13 03:39:11.588000 audit: BPF prog-id=116 op=UNLOAD Dec 13 03:39:11.588000 audit: BPF prog-id=115 op=UNLOAD Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:11.588000 audit: BPF prog-id=117 op=LOAD Dec 13 03:39:11.588000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a9f48 items=0 ppid=2181 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:11.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661393462386262356133633332626662653361633736333638383432 Dec 13 03:39:11.633953 env[1140]: time="2024-12-13T03:39:11.633758833Z" level=info msg="StartContainer for \"fa94b8bb5a3c32bfbe3ac7636884286337c7f1c8faad017b0b5c29a996b32c90\" returns successfully" Dec 13 03:39:12.457883 kubelet[2019]: I1213 03:39:12.457824 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-rh5kw" podStartSLOduration=10.457713001 podStartE2EDuration="10.457713001s" podCreationTimestamp="2024-12-13 03:39:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:39:04.498227951 +0000 UTC m=+12.274117232" watchObservedRunningTime="2024-12-13 03:39:12.457713001 +0000 UTC m=+20.233602312" Dec 13 03:39:14.645000 audit[2376]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:14.645000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe6a5da760 a2=0 a3=7ffe6a5da74c items=0 ppid=2156 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:14.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:14.652000 audit[2376]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:14.652000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe6a5da760 a2=0 a3=0 items=0 ppid=2156 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:14.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:14.659000 audit[2378]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:14.659000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff9aa941e0 a2=0 a3=7fff9aa941cc items=0 ppid=2156 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:14.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:14.664000 audit[2378]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:14.664000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff9aa941e0 a2=0 a3=0 items=0 ppid=2156 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:14.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:15.205146 kubelet[2019]: I1213 03:39:15.205076 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-5vf4p" podStartSLOduration=4.770646871 podStartE2EDuration="12.205015952s" podCreationTimestamp="2024-12-13 03:39:03 +0000 UTC" firstStartedPulling="2024-12-13 03:39:04.073276896 +0000 UTC m=+11.849166137" lastFinishedPulling="2024-12-13 03:39:11.507645997 +0000 UTC m=+19.283535218" observedRunningTime="2024-12-13 03:39:12.538041966 +0000 UTC m=+20.313931227" watchObservedRunningTime="2024-12-13 03:39:15.205015952 +0000 UTC m=+22.980905173" Dec 13 03:39:15.205665 kubelet[2019]: I1213 03:39:15.205348 2019 topology_manager.go:215] "Topology Admit Handler" podUID="7c6e0043-1eef-4a11-9fd4-8f90dcf56d58" podNamespace="calico-system" podName="calico-typha-df67d58c9-5dk7b" Dec 13 03:39:15.215302 systemd[1]: Created slice kubepods-besteffort-pod7c6e0043_1eef_4a11_9fd4_8f90dcf56d58.slice. Dec 13 03:39:15.255070 kubelet[2019]: I1213 03:39:15.255015 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bnz9\" (UniqueName: \"kubernetes.io/projected/7c6e0043-1eef-4a11-9fd4-8f90dcf56d58-kube-api-access-9bnz9\") pod \"calico-typha-df67d58c9-5dk7b\" (UID: \"7c6e0043-1eef-4a11-9fd4-8f90dcf56d58\") " pod="calico-system/calico-typha-df67d58c9-5dk7b" Dec 13 03:39:15.255205 kubelet[2019]: I1213 03:39:15.255083 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7c6e0043-1eef-4a11-9fd4-8f90dcf56d58-tigera-ca-bundle\") pod \"calico-typha-df67d58c9-5dk7b\" (UID: \"7c6e0043-1eef-4a11-9fd4-8f90dcf56d58\") " pod="calico-system/calico-typha-df67d58c9-5dk7b" Dec 13 03:39:15.255205 kubelet[2019]: I1213 03:39:15.255114 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7c6e0043-1eef-4a11-9fd4-8f90dcf56d58-typha-certs\") pod \"calico-typha-df67d58c9-5dk7b\" (UID: \"7c6e0043-1eef-4a11-9fd4-8f90dcf56d58\") " pod="calico-system/calico-typha-df67d58c9-5dk7b" Dec 13 03:39:15.355510 kubelet[2019]: I1213 03:39:15.355482 2019 topology_manager.go:215] "Topology Admit Handler" podUID="47923824-8ac5-4b90-81de-1907599c98fd" podNamespace="calico-system" podName="calico-node-5lg9p" Dec 13 03:39:15.363376 systemd[1]: Created slice kubepods-besteffort-pod47923824_8ac5_4b90_81de_1907599c98fd.slice. Dec 13 03:39:15.458107 kubelet[2019]: I1213 03:39:15.458019 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/47923824-8ac5-4b90-81de-1907599c98fd-node-certs\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458284 kubelet[2019]: I1213 03:39:15.458271 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-lib-calico\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458387 kubelet[2019]: I1213 03:39:15.458376 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-lib-modules\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458480 kubelet[2019]: I1213 03:39:15.458470 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-log-dir\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458587 kubelet[2019]: I1213 03:39:15.458577 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/47923824-8ac5-4b90-81de-1907599c98fd-tigera-ca-bundle\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458698 kubelet[2019]: I1213 03:39:15.458687 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-xtables-lock\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458807 kubelet[2019]: I1213 03:39:15.458794 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-net-dir\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.458914 kubelet[2019]: I1213 03:39:15.458894 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-run-calico\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.459036 kubelet[2019]: I1213 03:39:15.459024 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-flexvol-driver-host\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.459200 kubelet[2019]: I1213 03:39:15.459164 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b5km2\" (UniqueName: \"kubernetes.io/projected/47923824-8ac5-4b90-81de-1907599c98fd-kube-api-access-b5km2\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.459313 kubelet[2019]: I1213 03:39:15.459300 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-policysync\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.459415 kubelet[2019]: I1213 03:39:15.459403 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-bin-dir\") pod \"calico-node-5lg9p\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " pod="calico-system/calico-node-5lg9p" Dec 13 03:39:15.496095 kubelet[2019]: I1213 03:39:15.496051 2019 topology_manager.go:215] "Topology Admit Handler" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" podNamespace="calico-system" podName="csi-node-driver-9vdvk" Dec 13 03:39:15.496552 kubelet[2019]: E1213 03:39:15.496539 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:15.519354 env[1140]: time="2024-12-13T03:39:15.518985632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-df67d58c9-5dk7b,Uid:7c6e0043-1eef-4a11-9fd4-8f90dcf56d58,Namespace:calico-system,Attempt:0,}" Dec 13 03:39:15.542036 env[1140]: time="2024-12-13T03:39:15.541933201Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:39:15.542036 env[1140]: time="2024-12-13T03:39:15.541988034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:39:15.542036 env[1140]: time="2024-12-13T03:39:15.542003813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:39:15.547876 env[1140]: time="2024-12-13T03:39:15.542339372Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bdbf28adf239fd7d0b09c82dea6efc74365dfb0d251a44c433d795954181cd30 pid=2387 runtime=io.containerd.runc.v2 Dec 13 03:39:15.561759 kubelet[2019]: I1213 03:39:15.559920 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0511a489-3ef6-4634-bda9-6280d50164d6-registration-dir\") pod \"csi-node-driver-9vdvk\" (UID: \"0511a489-3ef6-4634-bda9-6280d50164d6\") " pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:15.561759 kubelet[2019]: I1213 03:39:15.560281 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0511a489-3ef6-4634-bda9-6280d50164d6-socket-dir\") pod \"csi-node-driver-9vdvk\" (UID: \"0511a489-3ef6-4634-bda9-6280d50164d6\") " pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:15.561759 kubelet[2019]: I1213 03:39:15.560419 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zpdqr\" (UniqueName: \"kubernetes.io/projected/0511a489-3ef6-4634-bda9-6280d50164d6-kube-api-access-zpdqr\") pod \"csi-node-driver-9vdvk\" (UID: \"0511a489-3ef6-4634-bda9-6280d50164d6\") " pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:15.561759 kubelet[2019]: I1213 03:39:15.560467 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0511a489-3ef6-4634-bda9-6280d50164d6-varrun\") pod \"csi-node-driver-9vdvk\" (UID: \"0511a489-3ef6-4634-bda9-6280d50164d6\") " pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:15.561759 kubelet[2019]: I1213 03:39:15.560585 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0511a489-3ef6-4634-bda9-6280d50164d6-kubelet-dir\") pod \"csi-node-driver-9vdvk\" (UID: \"0511a489-3ef6-4634-bda9-6280d50164d6\") " pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:15.562915 kubelet[2019]: E1213 03:39:15.562902 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.563035 kubelet[2019]: W1213 03:39:15.563020 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.563159 kubelet[2019]: E1213 03:39:15.563146 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.563460 kubelet[2019]: E1213 03:39:15.563448 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.563552 kubelet[2019]: W1213 03:39:15.563540 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.563655 kubelet[2019]: E1213 03:39:15.563644 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.563899 kubelet[2019]: E1213 03:39:15.563855 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.563899 kubelet[2019]: W1213 03:39:15.563883 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.564025 kubelet[2019]: E1213 03:39:15.563915 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.564141 kubelet[2019]: E1213 03:39:15.564123 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.564141 kubelet[2019]: W1213 03:39:15.564138 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.564219 kubelet[2019]: E1213 03:39:15.564152 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.564294 kubelet[2019]: E1213 03:39:15.564272 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.564294 kubelet[2019]: W1213 03:39:15.564286 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.564378 kubelet[2019]: E1213 03:39:15.564299 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.564498 kubelet[2019]: E1213 03:39:15.564465 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.564498 kubelet[2019]: W1213 03:39:15.564480 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.564498 kubelet[2019]: E1213 03:39:15.564493 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.564680 kubelet[2019]: E1213 03:39:15.564645 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.564680 kubelet[2019]: W1213 03:39:15.564674 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.564764 kubelet[2019]: E1213 03:39:15.564688 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.572521 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.574013 kubelet[2019]: W1213 03:39:15.572544 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.572774 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.574013 kubelet[2019]: W1213 03:39:15.572783 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.572938 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.574013 kubelet[2019]: W1213 03:39:15.572947 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.572964 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.573027 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.574013 kubelet[2019]: E1213 03:39:15.573158 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.574013 kubelet[2019]: W1213 03:39:15.573166 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.574465 kubelet[2019]: E1213 03:39:15.573178 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.574465 kubelet[2019]: E1213 03:39:15.573350 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.574465 kubelet[2019]: W1213 03:39:15.573358 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.574465 kubelet[2019]: E1213 03:39:15.573370 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.574465 kubelet[2019]: E1213 03:39:15.573388 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.578196 kubelet[2019]: E1213 03:39:15.578162 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.578196 kubelet[2019]: W1213 03:39:15.578189 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.578297 kubelet[2019]: E1213 03:39:15.578212 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.584215 kubelet[2019]: E1213 03:39:15.584194 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.584377 kubelet[2019]: W1213 03:39:15.584362 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.584515 kubelet[2019]: E1213 03:39:15.584504 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.595470 systemd[1]: Started cri-containerd-bdbf28adf239fd7d0b09c82dea6efc74365dfb0d251a44c433d795954181cd30.scope. Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit: BPF prog-id=118 op=LOAD Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2387 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626632386164663233396664376430623039633832646561366566 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2387 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626632386164663233396664376430623039633832646561366566 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit: BPF prog-id=119 op=LOAD Dec 13 03:39:15.633000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000253ce0 items=0 ppid=2387 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626632386164663233396664376430623039633832646561366566 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit: BPF prog-id=120 op=LOAD Dec 13 03:39:15.633000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000253d28 items=0 ppid=2387 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626632386164663233396664376430623039633832646561366566 Dec 13 03:39:15.633000 audit: BPF prog-id=120 op=UNLOAD Dec 13 03:39:15.633000 audit: BPF prog-id=119 op=UNLOAD Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { perfmon } for pid=2398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit[2398]: AVC avc: denied { bpf } for pid=2398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.633000 audit: BPF prog-id=121 op=LOAD Dec 13 03:39:15.633000 audit[2398]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000358138 items=0 ppid=2387 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264626632386164663233396664376430623039633832646561366566 Dec 13 03:39:15.661760 kubelet[2019]: E1213 03:39:15.661709 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.661760 kubelet[2019]: W1213 03:39:15.661738 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.661760 kubelet[2019]: E1213 03:39:15.661764 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.662058 kubelet[2019]: E1213 03:39:15.661963 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.662058 kubelet[2019]: W1213 03:39:15.661995 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.662058 kubelet[2019]: E1213 03:39:15.662011 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.662179 kubelet[2019]: E1213 03:39:15.662156 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.662179 kubelet[2019]: W1213 03:39:15.662171 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.662179 kubelet[2019]: E1213 03:39:15.662183 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.662610 kubelet[2019]: E1213 03:39:15.662581 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.662610 kubelet[2019]: W1213 03:39:15.662596 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.662706 kubelet[2019]: E1213 03:39:15.662614 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.662870 kubelet[2019]: E1213 03:39:15.662850 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.662870 kubelet[2019]: W1213 03:39:15.662865 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.662987 kubelet[2019]: E1213 03:39:15.662884 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.663089 kubelet[2019]: E1213 03:39:15.663068 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.663089 kubelet[2019]: W1213 03:39:15.663080 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.663188 kubelet[2019]: E1213 03:39:15.663097 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.663280 kubelet[2019]: E1213 03:39:15.663261 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.663280 kubelet[2019]: W1213 03:39:15.663274 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.663364 kubelet[2019]: E1213 03:39:15.663285 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.663433 kubelet[2019]: E1213 03:39:15.663414 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.663433 kubelet[2019]: W1213 03:39:15.663428 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.663526 kubelet[2019]: E1213 03:39:15.663447 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.663650 kubelet[2019]: E1213 03:39:15.663621 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.663650 kubelet[2019]: W1213 03:39:15.663635 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.663650 kubelet[2019]: E1213 03:39:15.663647 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.663808 kubelet[2019]: E1213 03:39:15.663790 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.663808 kubelet[2019]: W1213 03:39:15.663802 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.663896 kubelet[2019]: E1213 03:39:15.663817 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.664001 kubelet[2019]: E1213 03:39:15.663962 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.664052 kubelet[2019]: W1213 03:39:15.664007 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.664138 kubelet[2019]: E1213 03:39:15.664116 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.664226 kubelet[2019]: E1213 03:39:15.664142 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.664308 kubelet[2019]: W1213 03:39:15.664294 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.664419 kubelet[2019]: E1213 03:39:15.664396 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.664731 kubelet[2019]: E1213 03:39:15.664719 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.664826 kubelet[2019]: W1213 03:39:15.664815 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.664947 kubelet[2019]: E1213 03:39:15.664917 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.666119 kubelet[2019]: E1213 03:39:15.666085 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.666119 kubelet[2019]: W1213 03:39:15.666102 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.666227 kubelet[2019]: E1213 03:39:15.666204 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.666428 kubelet[2019]: E1213 03:39:15.666389 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.666428 kubelet[2019]: W1213 03:39:15.666414 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.666503 kubelet[2019]: E1213 03:39:15.666486 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.666718 kubelet[2019]: E1213 03:39:15.666690 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.666718 kubelet[2019]: W1213 03:39:15.666705 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.666853 kubelet[2019]: E1213 03:39:15.666833 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.667082 kubelet[2019]: E1213 03:39:15.667058 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.667082 kubelet[2019]: W1213 03:39:15.667072 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.667167 kubelet[2019]: E1213 03:39:15.667156 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.667292 kubelet[2019]: E1213 03:39:15.667274 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.667292 kubelet[2019]: W1213 03:39:15.667287 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.667366 kubelet[2019]: E1213 03:39:15.667303 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.667556 kubelet[2019]: E1213 03:39:15.667538 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.667556 kubelet[2019]: W1213 03:39:15.667552 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.667627 kubelet[2019]: E1213 03:39:15.667570 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.667919 kubelet[2019]: E1213 03:39:15.667897 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.667919 kubelet[2019]: W1213 03:39:15.667913 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.668075 kubelet[2019]: E1213 03:39:15.668053 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.668461 kubelet[2019]: E1213 03:39:15.668436 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.668461 kubelet[2019]: W1213 03:39:15.668450 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.669142 kubelet[2019]: E1213 03:39:15.668542 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.669142 kubelet[2019]: E1213 03:39:15.668678 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.669142 kubelet[2019]: W1213 03:39:15.668687 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.669142 kubelet[2019]: E1213 03:39:15.668768 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.669142 kubelet[2019]: E1213 03:39:15.668908 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.669142 kubelet[2019]: W1213 03:39:15.668917 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.669142 kubelet[2019]: E1213 03:39:15.668931 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.669398 kubelet[2019]: E1213 03:39:15.669159 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.669398 kubelet[2019]: W1213 03:39:15.669170 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.669398 kubelet[2019]: E1213 03:39:15.669182 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.673259 kubelet[2019]: E1213 03:39:15.673231 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.673259 kubelet[2019]: W1213 03:39:15.673251 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.673372 kubelet[2019]: E1213 03:39:15.673269 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.673717 env[1140]: time="2024-12-13T03:39:15.673663497Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5lg9p,Uid:47923824-8ac5-4b90-81de-1907599c98fd,Namespace:calico-system,Attempt:0,}" Dec 13 03:39:15.687893 kubelet[2019]: E1213 03:39:15.687847 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:15.687893 kubelet[2019]: W1213 03:39:15.687877 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:15.687893 kubelet[2019]: E1213 03:39:15.687901 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:15.702000 audit[2467]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:15.702000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdcee691b0 a2=0 a3=7ffdcee6919c items=0 ppid=2156 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:15.704933 env[1140]: time="2024-12-13T03:39:15.704854628Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:39:15.705117 env[1140]: time="2024-12-13T03:39:15.705078669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:39:15.705182 env[1140]: time="2024-12-13T03:39:15.705129253Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:39:15.705359 env[1140]: time="2024-12-13T03:39:15.705313329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8 pid=2466 runtime=io.containerd.runc.v2 Dec 13 03:39:15.706000 audit[2467]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:15.706000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdcee691b0 a2=0 a3=0 items=0 ppid=2156 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:15.725685 systemd[1]: Started cri-containerd-1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8.scope. Dec 13 03:39:15.752708 env[1140]: time="2024-12-13T03:39:15.752630626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-df67d58c9-5dk7b,Uid:7c6e0043-1eef-4a11-9fd4-8f90dcf56d58,Namespace:calico-system,Attempt:0,} returns sandbox id \"bdbf28adf239fd7d0b09c82dea6efc74365dfb0d251a44c433d795954181cd30\"" Dec 13 03:39:15.755232 env[1140]: time="2024-12-13T03:39:15.754706152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.777000 audit: BPF prog-id=122 op=LOAD Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353533373932306137363539303534636537366135656261396465 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353533373932306137363539303534636537366135656261396465 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.778000 audit: BPF prog-id=123 op=LOAD Dec 13 03:39:15.778000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002138b0 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353533373932306137363539303534636537366135656261396465 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.780000 audit: BPF prog-id=124 op=LOAD Dec 13 03:39:15.780000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002138f8 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353533373932306137363539303534636537366135656261396465 Dec 13 03:39:15.782000 audit: BPF prog-id=124 op=UNLOAD Dec 13 03:39:15.782000 audit: BPF prog-id=123 op=UNLOAD Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:15.782000 audit: BPF prog-id=125 op=LOAD Dec 13 03:39:15.782000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213d08 items=0 ppid=2466 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:15.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165353533373932306137363539303534636537366135656261396465 Dec 13 03:39:15.805956 env[1140]: time="2024-12-13T03:39:15.805890987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5lg9p,Uid:47923824-8ac5-4b90-81de-1907599c98fd,Namespace:calico-system,Attempt:0,} returns sandbox id \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\"" Dec 13 03:39:17.416357 kubelet[2019]: E1213 03:39:17.415387 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:17.439020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3602855376.mount: Deactivated successfully. Dec 13 03:39:19.415664 kubelet[2019]: E1213 03:39:19.415582 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:19.612759 env[1140]: time="2024-12-13T03:39:19.612640551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:19.851472 env[1140]: time="2024-12-13T03:39:19.851254857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:20.135140 env[1140]: time="2024-12-13T03:39:20.135063293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:20.402186 env[1140]: time="2024-12-13T03:39:20.401968615Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:20.405562 env[1140]: time="2024-12-13T03:39:20.404873713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 03:39:20.408467 env[1140]: time="2024-12-13T03:39:20.408410090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 03:39:20.439027 env[1140]: time="2024-12-13T03:39:20.438898537Z" level=info msg="CreateContainer within sandbox \"bdbf28adf239fd7d0b09c82dea6efc74365dfb0d251a44c433d795954181cd30\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 03:39:20.601182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3559983729.mount: Deactivated successfully. Dec 13 03:39:20.622446 env[1140]: time="2024-12-13T03:39:20.622346469Z" level=info msg="CreateContainer within sandbox \"bdbf28adf239fd7d0b09c82dea6efc74365dfb0d251a44c433d795954181cd30\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"eeecdf477138a487b97b8945975e5e24e3effc83c405dce9d534de645b922a19\"" Dec 13 03:39:20.627890 env[1140]: time="2024-12-13T03:39:20.627826233Z" level=info msg="StartContainer for \"eeecdf477138a487b97b8945975e5e24e3effc83c405dce9d534de645b922a19\"" Dec 13 03:39:20.680427 systemd[1]: Started cri-containerd-eeecdf477138a487b97b8945975e5e24e3effc83c405dce9d534de645b922a19.scope. Dec 13 03:39:20.710511 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 03:39:20.710638 kernel: audit: type=1400 audit(1734061160.705:876): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.710668 kernel: audit: type=1400 audit(1734061160.705:877): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.714474 kernel: audit: type=1400 audit(1734061160.705:878): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721135 kernel: audit: type=1400 audit(1734061160.705:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.727031 kernel: audit: type=1400 audit(1734061160.705:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.727156 kernel: audit: type=1400 audit(1734061160.705:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.735060 kernel: audit: type=1400 audit(1734061160.705:882): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.735130 kernel: audit: type=1400 audit(1734061160.705:883): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.742307 kernel: audit: type=1400 audit(1734061160.705:884): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.742546 kernel: audit: type=1400 audit(1734061160.711:885): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.711000 audit: BPF prog-id=126 op=LOAD Dec 13 03:39:20.712000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.712000 audit[2514]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2387 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:20.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656364663437373133386134383762393762383934353937356535 Dec 13 03:39:20.712000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.712000 audit[2514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2387 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:20.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656364663437373133386134383762393762383934353937356535 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.713000 audit: BPF prog-id=127 op=LOAD Dec 13 03:39:20.713000 audit[2514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00021b1d0 items=0 ppid=2387 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:20.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656364663437373133386134383762393762383934353937356535 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.720000 audit: BPF prog-id=128 op=LOAD Dec 13 03:39:20.720000 audit[2514]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00021b218 items=0 ppid=2387 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:20.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656364663437373133386134383762393762383934353937356535 Dec 13 03:39:20.721000 audit: BPF prog-id=128 op=UNLOAD Dec 13 03:39:20.721000 audit: BPF prog-id=127 op=UNLOAD Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:20.721000 audit: BPF prog-id=129 op=LOAD Dec 13 03:39:20.721000 audit[2514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00021b628 items=0 ppid=2387 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:20.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656364663437373133386134383762393762383934353937356535 Dec 13 03:39:20.786779 env[1140]: time="2024-12-13T03:39:20.786687395Z" level=info msg="StartContainer for \"eeecdf477138a487b97b8945975e5e24e3effc83c405dce9d534de645b922a19\" returns successfully" Dec 13 03:39:21.416652 kubelet[2019]: E1213 03:39:21.415364 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:21.608321 kubelet[2019]: E1213 03:39:21.608298 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.608505 kubelet[2019]: W1213 03:39:21.608491 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.608613 kubelet[2019]: E1213 03:39:21.608592 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.608884 kubelet[2019]: E1213 03:39:21.608873 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.608969 kubelet[2019]: W1213 03:39:21.608957 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.609068 kubelet[2019]: E1213 03:39:21.609058 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.609302 kubelet[2019]: E1213 03:39:21.609292 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.609385 kubelet[2019]: W1213 03:39:21.609373 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.609463 kubelet[2019]: E1213 03:39:21.609454 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.609707 kubelet[2019]: E1213 03:39:21.609696 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.609796 kubelet[2019]: W1213 03:39:21.609784 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.609893 kubelet[2019]: E1213 03:39:21.609883 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.610144 kubelet[2019]: E1213 03:39:21.610133 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.610231 kubelet[2019]: W1213 03:39:21.610219 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.610324 kubelet[2019]: E1213 03:39:21.610314 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.610546 kubelet[2019]: E1213 03:39:21.610535 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.610630 kubelet[2019]: W1213 03:39:21.610619 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.610704 kubelet[2019]: E1213 03:39:21.610695 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.610987 kubelet[2019]: E1213 03:39:21.610965 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.611070 kubelet[2019]: W1213 03:39:21.611058 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.611172 kubelet[2019]: E1213 03:39:21.611163 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.611403 kubelet[2019]: E1213 03:39:21.611392 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.611479 kubelet[2019]: W1213 03:39:21.611469 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.611557 kubelet[2019]: E1213 03:39:21.611547 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.611800 kubelet[2019]: E1213 03:39:21.611789 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.611879 kubelet[2019]: W1213 03:39:21.611868 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.611966 kubelet[2019]: E1213 03:39:21.611943 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.612272 kubelet[2019]: E1213 03:39:21.612260 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.612351 kubelet[2019]: W1213 03:39:21.612340 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.612416 kubelet[2019]: E1213 03:39:21.612408 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.612627 kubelet[2019]: E1213 03:39:21.612617 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.612709 kubelet[2019]: W1213 03:39:21.612698 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.612776 kubelet[2019]: E1213 03:39:21.612767 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.612998 kubelet[2019]: E1213 03:39:21.612986 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.613070 kubelet[2019]: W1213 03:39:21.613059 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.613137 kubelet[2019]: E1213 03:39:21.613128 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.613594 kubelet[2019]: E1213 03:39:21.613582 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.613685 kubelet[2019]: W1213 03:39:21.613673 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.613751 kubelet[2019]: E1213 03:39:21.613742 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.613961 kubelet[2019]: E1213 03:39:21.613950 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.614056 kubelet[2019]: W1213 03:39:21.614046 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.614119 kubelet[2019]: E1213 03:39:21.614111 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.614317 kubelet[2019]: E1213 03:39:21.614306 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.614384 kubelet[2019]: W1213 03:39:21.614374 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.614444 kubelet[2019]: E1213 03:39:21.614436 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.625352 kubelet[2019]: E1213 03:39:21.625304 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.625414 kubelet[2019]: W1213 03:39:21.625353 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.625414 kubelet[2019]: E1213 03:39:21.625401 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.625879 kubelet[2019]: E1213 03:39:21.625850 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.625941 kubelet[2019]: W1213 03:39:21.625882 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.625941 kubelet[2019]: E1213 03:39:21.625927 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.626385 kubelet[2019]: E1213 03:39:21.626372 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.626458 kubelet[2019]: W1213 03:39:21.626447 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.626548 kubelet[2019]: E1213 03:39:21.626537 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.626969 kubelet[2019]: E1213 03:39:21.626941 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.627049 kubelet[2019]: W1213 03:39:21.626972 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.627082 kubelet[2019]: E1213 03:39:21.627055 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.627407 kubelet[2019]: E1213 03:39:21.627396 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.627474 kubelet[2019]: W1213 03:39:21.627462 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.627552 kubelet[2019]: E1213 03:39:21.627541 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.628065 kubelet[2019]: E1213 03:39:21.628032 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.628127 kubelet[2019]: W1213 03:39:21.628072 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.628163 kubelet[2019]: E1213 03:39:21.628129 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.628522 kubelet[2019]: E1213 03:39:21.628495 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.628575 kubelet[2019]: W1213 03:39:21.628525 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.628650 kubelet[2019]: E1213 03:39:21.628637 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.629006 kubelet[2019]: E1213 03:39:21.628951 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.629158 kubelet[2019]: W1213 03:39:21.629126 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.629259 kubelet[2019]: E1213 03:39:21.629235 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.629545 kubelet[2019]: E1213 03:39:21.629517 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.629598 kubelet[2019]: W1213 03:39:21.629548 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.629674 kubelet[2019]: E1213 03:39:21.629662 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.629949 kubelet[2019]: E1213 03:39:21.629921 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.630040 kubelet[2019]: W1213 03:39:21.629952 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.630079 kubelet[2019]: E1213 03:39:21.630038 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.630339 kubelet[2019]: E1213 03:39:21.630328 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.630410 kubelet[2019]: W1213 03:39:21.630399 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.630471 kubelet[2019]: E1213 03:39:21.630462 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.630656 kubelet[2019]: E1213 03:39:21.630645 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.630727 kubelet[2019]: W1213 03:39:21.630716 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.630786 kubelet[2019]: E1213 03:39:21.630778 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.631172 kubelet[2019]: E1213 03:39:21.631143 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.631235 kubelet[2019]: W1213 03:39:21.631177 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.631235 kubelet[2019]: E1213 03:39:21.631223 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.631750 kubelet[2019]: E1213 03:39:21.631721 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.631815 kubelet[2019]: W1213 03:39:21.631752 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.631815 kubelet[2019]: E1213 03:39:21.631798 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.632145 kubelet[2019]: E1213 03:39:21.632134 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.632224 kubelet[2019]: W1213 03:39:21.632213 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.632292 kubelet[2019]: E1213 03:39:21.632283 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.632483 kubelet[2019]: E1213 03:39:21.632473 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.632550 kubelet[2019]: W1213 03:39:21.632540 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.632611 kubelet[2019]: E1213 03:39:21.632603 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.632928 kubelet[2019]: E1213 03:39:21.632917 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.633026 kubelet[2019]: W1213 03:39:21.633014 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.633092 kubelet[2019]: E1213 03:39:21.633083 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.635255 kubelet[2019]: E1213 03:39:21.635245 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:21.635345 kubelet[2019]: W1213 03:39:21.635334 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:21.635407 kubelet[2019]: E1213 03:39:21.635399 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:21.637465 kubelet[2019]: I1213 03:39:21.637448 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-df67d58c9-5dk7b" podStartSLOduration=1.985566123 podStartE2EDuration="6.637410188s" podCreationTimestamp="2024-12-13 03:39:15 +0000 UTC" firstStartedPulling="2024-12-13 03:39:15.754282075 +0000 UTC m=+23.530171296" lastFinishedPulling="2024-12-13 03:39:20.40612609 +0000 UTC m=+28.182015361" observedRunningTime="2024-12-13 03:39:21.576153587 +0000 UTC m=+29.352042818" watchObservedRunningTime="2024-12-13 03:39:21.637410188 +0000 UTC m=+29.413299409" Dec 13 03:39:21.711000 audit[2579]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:21.711000 audit[2579]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc0bfb5c50 a2=0 a3=7ffc0bfb5c3c items=0 ppid=2156 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:21.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:21.718000 audit[2579]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:39:21.718000 audit[2579]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc0bfb5c50 a2=0 a3=7ffc0bfb5c3c items=0 ppid=2156 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:21.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:39:22.467847 env[1140]: time="2024-12-13T03:39:22.467731811Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:22.471854 env[1140]: time="2024-12-13T03:39:22.471793164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:22.475176 env[1140]: time="2024-12-13T03:39:22.475127178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:22.478511 env[1140]: time="2024-12-13T03:39:22.477172247Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:22.478650 env[1140]: time="2024-12-13T03:39:22.477895749Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 03:39:22.483604 env[1140]: time="2024-12-13T03:39:22.483511718Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:39:22.519183 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3685680114.mount: Deactivated successfully. Dec 13 03:39:22.620996 kubelet[2019]: E1213 03:39:22.620918 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.621407 kubelet[2019]: W1213 03:39:22.620975 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.621407 kubelet[2019]: E1213 03:39:22.621066 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.621546 kubelet[2019]: E1213 03:39:22.621515 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.621611 kubelet[2019]: W1213 03:39:22.621550 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.621611 kubelet[2019]: E1213 03:39:22.621581 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.621915 kubelet[2019]: E1213 03:39:22.621888 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.622027 kubelet[2019]: W1213 03:39:22.621916 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.622027 kubelet[2019]: E1213 03:39:22.621945 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.622326 kubelet[2019]: E1213 03:39:22.622299 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.622387 kubelet[2019]: W1213 03:39:22.622328 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.622387 kubelet[2019]: E1213 03:39:22.622357 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.622820 kubelet[2019]: E1213 03:39:22.622778 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.622820 kubelet[2019]: W1213 03:39:22.622808 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.622932 kubelet[2019]: E1213 03:39:22.622836 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.624071 kubelet[2019]: E1213 03:39:22.623405 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.624071 kubelet[2019]: W1213 03:39:22.623435 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.624071 kubelet[2019]: E1213 03:39:22.623471 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.624071 kubelet[2019]: E1213 03:39:22.623752 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.624071 kubelet[2019]: W1213 03:39:22.623771 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.624071 kubelet[2019]: E1213 03:39:22.623798 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.624291 kubelet[2019]: E1213 03:39:22.624124 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.624291 kubelet[2019]: W1213 03:39:22.624144 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.624291 kubelet[2019]: E1213 03:39:22.624172 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.624513 kubelet[2019]: E1213 03:39:22.624487 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.624575 kubelet[2019]: W1213 03:39:22.624515 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.624575 kubelet[2019]: E1213 03:39:22.624543 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.624916 kubelet[2019]: E1213 03:39:22.624879 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.624916 kubelet[2019]: W1213 03:39:22.624907 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.625031 kubelet[2019]: E1213 03:39:22.624935 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.625635 kubelet[2019]: E1213 03:39:22.625448 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.625635 kubelet[2019]: W1213 03:39:22.625470 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.625805 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626178 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.627281 kubelet[2019]: W1213 03:39:22.626198 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626227 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626517 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.627281 kubelet[2019]: W1213 03:39:22.626536 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626562 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626835 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.627281 kubelet[2019]: W1213 03:39:22.626855 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.627281 kubelet[2019]: E1213 03:39:22.626887 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.627681 kubelet[2019]: E1213 03:39:22.627224 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.627681 kubelet[2019]: W1213 03:39:22.627243 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.627681 kubelet[2019]: E1213 03:39:22.627273 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.633898 kubelet[2019]: E1213 03:39:22.633715 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.633898 kubelet[2019]: W1213 03:39:22.633734 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.633898 kubelet[2019]: E1213 03:39:22.633757 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.634379 kubelet[2019]: E1213 03:39:22.634053 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.634379 kubelet[2019]: W1213 03:39:22.634064 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.634379 kubelet[2019]: E1213 03:39:22.634078 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.634379 kubelet[2019]: E1213 03:39:22.634279 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.634379 kubelet[2019]: W1213 03:39:22.634289 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.634379 kubelet[2019]: E1213 03:39:22.634304 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.634765 kubelet[2019]: E1213 03:39:22.634489 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.634765 kubelet[2019]: W1213 03:39:22.634500 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.634765 kubelet[2019]: E1213 03:39:22.634512 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.634765 kubelet[2019]: E1213 03:39:22.634663 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.634765 kubelet[2019]: W1213 03:39:22.634673 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.634765 kubelet[2019]: E1213 03:39:22.634685 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.635215 kubelet[2019]: E1213 03:39:22.634830 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.635215 kubelet[2019]: W1213 03:39:22.634839 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.635215 kubelet[2019]: E1213 03:39:22.634852 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.635215 kubelet[2019]: E1213 03:39:22.635019 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.635215 kubelet[2019]: W1213 03:39:22.635028 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.635215 kubelet[2019]: E1213 03:39:22.635040 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.635643 kubelet[2019]: E1213 03:39:22.635481 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.635643 kubelet[2019]: W1213 03:39:22.635493 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.635643 kubelet[2019]: E1213 03:39:22.635506 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.635836 kubelet[2019]: E1213 03:39:22.635676 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.635836 kubelet[2019]: W1213 03:39:22.635686 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.635836 kubelet[2019]: E1213 03:39:22.635699 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.636105 kubelet[2019]: E1213 03:39:22.635846 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.636105 kubelet[2019]: W1213 03:39:22.635856 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.636105 kubelet[2019]: E1213 03:39:22.635870 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.636105 kubelet[2019]: E1213 03:39:22.636035 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.636105 kubelet[2019]: W1213 03:39:22.636044 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.636105 kubelet[2019]: E1213 03:39:22.636058 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.636494 kubelet[2019]: E1213 03:39:22.636243 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.636494 kubelet[2019]: W1213 03:39:22.636267 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.636494 kubelet[2019]: E1213 03:39:22.636280 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.636727 kubelet[2019]: E1213 03:39:22.636516 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.636727 kubelet[2019]: W1213 03:39:22.636526 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.636727 kubelet[2019]: E1213 03:39:22.636538 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.636727 kubelet[2019]: E1213 03:39:22.636712 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.636727 kubelet[2019]: W1213 03:39:22.636721 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.636727 kubelet[2019]: E1213 03:39:22.636733 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.637182 kubelet[2019]: E1213 03:39:22.636878 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.637182 kubelet[2019]: W1213 03:39:22.636887 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.637182 kubelet[2019]: E1213 03:39:22.636899 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.637182 kubelet[2019]: E1213 03:39:22.637047 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.637182 kubelet[2019]: W1213 03:39:22.637056 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.637182 kubelet[2019]: E1213 03:39:22.637068 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.637636 kubelet[2019]: E1213 03:39:22.637241 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.637636 kubelet[2019]: W1213 03:39:22.637253 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.637636 kubelet[2019]: E1213 03:39:22.637266 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:22.637636 kubelet[2019]: E1213 03:39:22.637528 2019 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 03:39:22.637636 kubelet[2019]: W1213 03:39:22.637537 2019 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 03:39:22.637636 kubelet[2019]: E1213 03:39:22.637548 2019 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 03:39:23.150292 env[1140]: time="2024-12-13T03:39:23.150202970Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\"" Dec 13 03:39:23.155492 env[1140]: time="2024-12-13T03:39:23.154710672Z" level=info msg="StartContainer for \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\"" Dec 13 03:39:23.233721 systemd[1]: Started cri-containerd-9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c.scope. Dec 13 03:39:23.255000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.255000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f530c4c61a8 items=0 ppid=2466 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:23.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653135383836613662653733363534623935313136633639353136 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.256000 audit: BPF prog-id=130 op=LOAD Dec 13 03:39:23.256000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00033aed8 items=0 ppid=2466 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:23.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653135383836613662653733363534623935313136633639353136 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.257000 audit: BPF prog-id=131 op=LOAD Dec 13 03:39:23.257000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00033af28 items=0 ppid=2466 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:23.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653135383836613662653733363534623935313136633639353136 Dec 13 03:39:23.258000 audit: BPF prog-id=131 op=UNLOAD Dec 13 03:39:23.258000 audit: BPF prog-id=130 op=UNLOAD Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { perfmon } for pid=2621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit[2621]: AVC avc: denied { bpf } for pid=2621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:23.258000 audit: BPF prog-id=132 op=LOAD Dec 13 03:39:23.258000 audit[2621]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00033afb8 items=0 ppid=2466 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:23.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965653135383836613662653733363534623935313136633639353136 Dec 13 03:39:23.279722 env[1140]: time="2024-12-13T03:39:23.279614729Z" level=info msg="StartContainer for \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\" returns successfully" Dec 13 03:39:23.292555 systemd[1]: cri-containerd-9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c.scope: Deactivated successfully. Dec 13 03:39:23.295000 audit: BPF prog-id=132 op=UNLOAD Dec 13 03:39:23.417556 kubelet[2019]: E1213 03:39:23.415221 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:23.516566 systemd[1]: run-containerd-runc-k8s.io-9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c-runc.ZkdnEJ.mount: Deactivated successfully. Dec 13 03:39:23.516856 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c-rootfs.mount: Deactivated successfully. Dec 13 03:39:23.553582 env[1140]: time="2024-12-13T03:39:23.553480284Z" level=info msg="shim disconnected" id=9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c Dec 13 03:39:23.555649 env[1140]: time="2024-12-13T03:39:23.553587255Z" level=warning msg="cleaning up after shim disconnected" id=9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c namespace=k8s.io Dec 13 03:39:23.555649 env[1140]: time="2024-12-13T03:39:23.553724403Z" level=info msg="cleaning up dead shim" Dec 13 03:39:23.586955 env[1140]: time="2024-12-13T03:39:23.586843485Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:39:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2660 runtime=io.containerd.runc.v2\n" Dec 13 03:39:24.560803 env[1140]: time="2024-12-13T03:39:24.560337847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 03:39:25.415447 kubelet[2019]: E1213 03:39:25.415393 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:27.415473 kubelet[2019]: E1213 03:39:27.415089 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:29.414708 kubelet[2019]: E1213 03:39:29.414641 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:31.415130 kubelet[2019]: E1213 03:39:31.415093 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:32.930148 env[1140]: time="2024-12-13T03:39:32.930073027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:32.934323 env[1140]: time="2024-12-13T03:39:32.934267825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:32.936955 env[1140]: time="2024-12-13T03:39:32.936904694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:32.939240 env[1140]: time="2024-12-13T03:39:32.939187426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:32.941055 env[1140]: time="2024-12-13T03:39:32.940947165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 03:39:32.946947 env[1140]: time="2024-12-13T03:39:32.946611345Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:39:32.988106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547135196.mount: Deactivated successfully. Dec 13 03:39:33.022638 env[1140]: time="2024-12-13T03:39:33.022558775Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\"" Dec 13 03:39:33.025543 env[1140]: time="2024-12-13T03:39:33.025443518Z" level=info msg="StartContainer for \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\"" Dec 13 03:39:33.057215 systemd[1]: Started cri-containerd-53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786.scope. Dec 13 03:39:33.122091 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 03:39:33.122314 kernel: audit: type=1400 audit(1734061173.110:903): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbd81adef88 items=0 ppid=2466 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:33.136038 kernel: audit: type=1300 audit(1734061173.110:903): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbd81adef88 items=0 ppid=2466 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:33.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633665356239646336313361373065343061383435326139623336 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.155161 kernel: audit: type=1327 audit(1734061173.110:903): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633665356239646336313361373065343061383435326139623336 Dec 13 03:39:33.155248 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.168008 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.168112 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.168144 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.174795 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.179010 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.185011 kernel: audit: type=1400 audit(1734061173.110:904): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.110000 audit: BPF prog-id=133 op=LOAD Dec 13 03:39:33.110000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fc8b8 items=0 ppid=2466 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:33.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633665356239646336313361373065343061383435326139623336 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.113000 audit: BPF prog-id=134 op=LOAD Dec 13 03:39:33.113000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fc908 items=0 ppid=2466 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:33.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633665356239646336313361373065343061383435326139623336 Dec 13 03:39:33.120000 audit: BPF prog-id=134 op=UNLOAD Dec 13 03:39:33.120000 audit: BPF prog-id=133 op=UNLOAD Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:33.120000 audit: BPF prog-id=135 op=LOAD Dec 13 03:39:33.120000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fc998 items=0 ppid=2466 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:33.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633665356239646336313361373065343061383435326139623336 Dec 13 03:39:33.414986 kubelet[2019]: E1213 03:39:33.414936 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:33.693057 env[1140]: time="2024-12-13T03:39:33.692803669Z" level=info msg="StartContainer for \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\" returns successfully" Dec 13 03:39:35.415630 kubelet[2019]: E1213 03:39:35.414781 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:35.988573 env[1140]: time="2024-12-13T03:39:35.988450403Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 03:39:35.994839 systemd[1]: cri-containerd-53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786.scope: Deactivated successfully. Dec 13 03:39:35.997000 audit: BPF prog-id=135 op=UNLOAD Dec 13 03:39:36.029735 kubelet[2019]: I1213 03:39:36.029660 2019 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 03:39:36.053276 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786-rootfs.mount: Deactivated successfully. Dec 13 03:39:36.079346 env[1140]: time="2024-12-13T03:39:36.079302039Z" level=info msg="shim disconnected" id=53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786 Dec 13 03:39:36.079620 env[1140]: time="2024-12-13T03:39:36.079596161Z" level=warning msg="cleaning up after shim disconnected" id=53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786 namespace=k8s.io Dec 13 03:39:36.079749 env[1140]: time="2024-12-13T03:39:36.079731656Z" level=info msg="cleaning up dead shim" Dec 13 03:39:36.088846 env[1140]: time="2024-12-13T03:39:36.088794554Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:39:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2725 runtime=io.containerd.runc.v2\n" Dec 13 03:39:36.111601 kubelet[2019]: I1213 03:39:36.111569 2019 topology_manager.go:215] "Topology Admit Handler" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" podNamespace="kube-system" podName="coredns-76f75df574-jdwm9" Dec 13 03:39:36.116791 systemd[1]: Created slice kubepods-burstable-podee472d7b_bab8_4369_b29f_b404b9bc9acc.slice. Dec 13 03:39:36.123139 kubelet[2019]: I1213 03:39:36.123115 2019 topology_manager.go:215] "Topology Admit Handler" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" podNamespace="calico-system" podName="calico-kube-controllers-746c895955-cdbs4" Dec 13 03:39:36.123457 kubelet[2019]: I1213 03:39:36.123442 2019 topology_manager.go:215] "Topology Admit Handler" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" podNamespace="kube-system" podName="coredns-76f75df574-9ldmh" Dec 13 03:39:36.124451 kubelet[2019]: I1213 03:39:36.124428 2019 topology_manager.go:215] "Topology Admit Handler" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" podNamespace="calico-apiserver" podName="calico-apiserver-5d67d6dbcf-sv9cc" Dec 13 03:39:36.125016 kubelet[2019]: I1213 03:39:36.125002 2019 topology_manager.go:215] "Topology Admit Handler" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" podNamespace="calico-apiserver" podName="calico-apiserver-5d67d6dbcf-xcg8f" Dec 13 03:39:36.129711 systemd[1]: Created slice kubepods-burstable-pod798eee9e_c412_481d_ae46_a472fa8e2ee0.slice. Dec 13 03:39:36.139056 systemd[1]: Created slice kubepods-besteffort-podae02de06_006f_4364_afd7_4f696b4572fa.slice. Dec 13 03:39:36.144007 systemd[1]: Created slice kubepods-besteffort-pod2f1d0841_8d75_4c73_a853_4ede410b6584.slice. Dec 13 03:39:36.152329 systemd[1]: Created slice kubepods-besteffort-poda0d1c06e_1ad7_45d6_8d62_f5a66cad1314.slice. Dec 13 03:39:36.161450 kubelet[2019]: I1213 03:39:36.161399 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nzgpw\" (UniqueName: \"kubernetes.io/projected/a0d1c06e-1ad7-45d6-8d62-f5a66cad1314-kube-api-access-nzgpw\") pod \"calico-apiserver-5d67d6dbcf-xcg8f\" (UID: \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\") " pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" Dec 13 03:39:36.162047 kubelet[2019]: I1213 03:39:36.162016 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a0d1c06e-1ad7-45d6-8d62-f5a66cad1314-calico-apiserver-certs\") pod \"calico-apiserver-5d67d6dbcf-xcg8f\" (UID: \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\") " pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" Dec 13 03:39:36.263342 kubelet[2019]: I1213 03:39:36.263222 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2f1d0841-8d75-4c73-a853-4ede410b6584-calico-apiserver-certs\") pod \"calico-apiserver-5d67d6dbcf-sv9cc\" (UID: \"2f1d0841-8d75-4c73-a853-4ede410b6584\") " pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" Dec 13 03:39:36.263531 kubelet[2019]: I1213 03:39:36.263517 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ee472d7b-bab8-4369-b29f-b404b9bc9acc-config-volume\") pod \"coredns-76f75df574-jdwm9\" (UID: \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\") " pod="kube-system/coredns-76f75df574-jdwm9" Dec 13 03:39:36.263656 kubelet[2019]: I1213 03:39:36.263644 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhlnp\" (UniqueName: \"kubernetes.io/projected/ee472d7b-bab8-4369-b29f-b404b9bc9acc-kube-api-access-qhlnp\") pod \"coredns-76f75df574-jdwm9\" (UID: \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\") " pod="kube-system/coredns-76f75df574-jdwm9" Dec 13 03:39:36.263778 kubelet[2019]: I1213 03:39:36.263767 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/798eee9e-c412-481d-ae46-a472fa8e2ee0-config-volume\") pod \"coredns-76f75df574-9ldmh\" (UID: \"798eee9e-c412-481d-ae46-a472fa8e2ee0\") " pod="kube-system/coredns-76f75df574-9ldmh" Dec 13 03:39:36.263899 kubelet[2019]: I1213 03:39:36.263888 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcgtg\" (UniqueName: \"kubernetes.io/projected/ae02de06-006f-4364-afd7-4f696b4572fa-kube-api-access-jcgtg\") pod \"calico-kube-controllers-746c895955-cdbs4\" (UID: \"ae02de06-006f-4364-afd7-4f696b4572fa\") " pod="calico-system/calico-kube-controllers-746c895955-cdbs4" Dec 13 03:39:36.264107 kubelet[2019]: I1213 03:39:36.264095 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n2g5n\" (UniqueName: \"kubernetes.io/projected/2f1d0841-8d75-4c73-a853-4ede410b6584-kube-api-access-n2g5n\") pod \"calico-apiserver-5d67d6dbcf-sv9cc\" (UID: \"2f1d0841-8d75-4c73-a853-4ede410b6584\") " pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" Dec 13 03:39:36.264220 kubelet[2019]: I1213 03:39:36.264209 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4jws7\" (UniqueName: \"kubernetes.io/projected/798eee9e-c412-481d-ae46-a472fa8e2ee0-kube-api-access-4jws7\") pod \"coredns-76f75df574-9ldmh\" (UID: \"798eee9e-c412-481d-ae46-a472fa8e2ee0\") " pod="kube-system/coredns-76f75df574-9ldmh" Dec 13 03:39:36.264340 kubelet[2019]: I1213 03:39:36.264329 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ae02de06-006f-4364-afd7-4f696b4572fa-tigera-ca-bundle\") pod \"calico-kube-controllers-746c895955-cdbs4\" (UID: \"ae02de06-006f-4364-afd7-4f696b4572fa\") " pod="calico-system/calico-kube-controllers-746c895955-cdbs4" Dec 13 03:39:36.421424 env[1140]: time="2024-12-13T03:39:36.421027374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jdwm9,Uid:ee472d7b-bab8-4369-b29f-b404b9bc9acc,Namespace:kube-system,Attempt:0,}" Dec 13 03:39:36.435434 env[1140]: time="2024-12-13T03:39:36.435400414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9ldmh,Uid:798eee9e-c412-481d-ae46-a472fa8e2ee0,Namespace:kube-system,Attempt:0,}" Dec 13 03:39:36.441610 env[1140]: time="2024-12-13T03:39:36.441584449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-746c895955-cdbs4,Uid:ae02de06-006f-4364-afd7-4f696b4572fa,Namespace:calico-system,Attempt:0,}" Dec 13 03:39:36.456216 env[1140]: time="2024-12-13T03:39:36.456148900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-sv9cc,Uid:2f1d0841-8d75-4c73-a853-4ede410b6584,Namespace:calico-apiserver,Attempt:0,}" Dec 13 03:39:36.457773 env[1140]: time="2024-12-13T03:39:36.457713571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-xcg8f,Uid:a0d1c06e-1ad7-45d6-8d62-f5a66cad1314,Namespace:calico-apiserver,Attempt:0,}" Dec 13 03:39:36.718883 env[1140]: time="2024-12-13T03:39:36.717286437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 03:39:36.809957 env[1140]: time="2024-12-13T03:39:36.809874074Z" level=error msg="Failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.810316 env[1140]: time="2024-12-13T03:39:36.810274556Z" level=error msg="encountered an error cleaning up failed sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.810375 env[1140]: time="2024-12-13T03:39:36.810334269Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-sv9cc,Uid:2f1d0841-8d75-4c73-a853-4ede410b6584,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.811527 kubelet[2019]: E1213 03:39:36.810596 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.811527 kubelet[2019]: E1213 03:39:36.810654 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" Dec 13 03:39:36.811527 kubelet[2019]: E1213 03:39:36.810679 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" Dec 13 03:39:36.811887 kubelet[2019]: E1213 03:39:36.810739 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5d67d6dbcf-sv9cc_calico-apiserver(2f1d0841-8d75-4c73-a853-4ede410b6584)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5d67d6dbcf-sv9cc_calico-apiserver(2f1d0841-8d75-4c73-a853-4ede410b6584)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" Dec 13 03:39:36.816739 env[1140]: time="2024-12-13T03:39:36.816668898Z" level=error msg="Failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.817104 env[1140]: time="2024-12-13T03:39:36.817065443Z" level=error msg="encountered an error cleaning up failed sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.817194 env[1140]: time="2024-12-13T03:39:36.817159009Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jdwm9,Uid:ee472d7b-bab8-4369-b29f-b404b9bc9acc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.817576 kubelet[2019]: E1213 03:39:36.817353 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.817576 kubelet[2019]: E1213 03:39:36.817404 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-jdwm9" Dec 13 03:39:36.817576 kubelet[2019]: E1213 03:39:36.817428 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-jdwm9" Dec 13 03:39:36.821384 kubelet[2019]: E1213 03:39:36.817483 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-jdwm9_kube-system(ee472d7b-bab8-4369-b29f-b404b9bc9acc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-jdwm9_kube-system(ee472d7b-bab8-4369-b29f-b404b9bc9acc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jdwm9" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" Dec 13 03:39:36.829778 env[1140]: time="2024-12-13T03:39:36.829716996Z" level=error msg="Failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.830157 env[1140]: time="2024-12-13T03:39:36.830106148Z" level=error msg="encountered an error cleaning up failed sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.830211 env[1140]: time="2024-12-13T03:39:36.830163796Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-746c895955-cdbs4,Uid:ae02de06-006f-4364-afd7-4f696b4572fa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832192 env[1140]: time="2024-12-13T03:39:36.830961727Z" level=error msg="Failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832192 env[1140]: time="2024-12-13T03:39:36.831277079Z" level=error msg="encountered an error cleaning up failed sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832192 env[1140]: time="2024-12-13T03:39:36.831318929Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9ldmh,Uid:798eee9e-c412-481d-ae46-a472fa8e2ee0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832658 kubelet[2019]: E1213 03:39:36.830391 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832658 kubelet[2019]: E1213 03:39:36.830456 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" Dec 13 03:39:36.832658 kubelet[2019]: E1213 03:39:36.830498 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" Dec 13 03:39:36.832862 kubelet[2019]: E1213 03:39:36.830574 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-746c895955-cdbs4_calico-system(ae02de06-006f-4364-afd7-4f696b4572fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-746c895955-cdbs4_calico-system(ae02de06-006f-4364-afd7-4f696b4572fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" Dec 13 03:39:36.832862 kubelet[2019]: E1213 03:39:36.832292 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.832862 kubelet[2019]: E1213 03:39:36.832562 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9ldmh" Dec 13 03:39:36.833143 kubelet[2019]: E1213 03:39:36.832593 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9ldmh" Dec 13 03:39:36.833143 kubelet[2019]: E1213 03:39:36.833075 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-9ldmh_kube-system(798eee9e-c412-481d-ae46-a472fa8e2ee0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-9ldmh_kube-system(798eee9e-c412-481d-ae46-a472fa8e2ee0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9ldmh" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" Dec 13 03:39:36.836051 env[1140]: time="2024-12-13T03:39:36.836003575Z" level=error msg="Failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.836439 env[1140]: time="2024-12-13T03:39:36.836407374Z" level=error msg="encountered an error cleaning up failed sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.836572 env[1140]: time="2024-12-13T03:39:36.836540815Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-xcg8f,Uid:a0d1c06e-1ad7-45d6-8d62-f5a66cad1314,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.836897 kubelet[2019]: E1213 03:39:36.836873 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:36.837015 kubelet[2019]: E1213 03:39:36.836925 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" Dec 13 03:39:36.837015 kubelet[2019]: E1213 03:39:36.836949 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" Dec 13 03:39:36.837112 kubelet[2019]: E1213 03:39:36.837026 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5d67d6dbcf-xcg8f_calico-apiserver(a0d1c06e-1ad7-45d6-8d62-f5a66cad1314)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5d67d6dbcf-xcg8f_calico-apiserver(a0d1c06e-1ad7-45d6-8d62-f5a66cad1314)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" Dec 13 03:39:37.421322 systemd[1]: Created slice kubepods-besteffort-pod0511a489_3ef6_4634_bda9_6280d50164d6.slice. Dec 13 03:39:37.425847 env[1140]: time="2024-12-13T03:39:37.425797862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9vdvk,Uid:0511a489-3ef6-4634-bda9-6280d50164d6,Namespace:calico-system,Attempt:0,}" Dec 13 03:39:37.557526 env[1140]: time="2024-12-13T03:39:37.557467696Z" level=error msg="Failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.563014 env[1140]: time="2024-12-13T03:39:37.560317042Z" level=error msg="encountered an error cleaning up failed sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.563014 env[1140]: time="2024-12-13T03:39:37.560396612Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9vdvk,Uid:0511a489-3ef6-4634-bda9-6280d50164d6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.561852 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a-shm.mount: Deactivated successfully. Dec 13 03:39:37.563255 kubelet[2019]: E1213 03:39:37.560636 2019 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.563255 kubelet[2019]: E1213 03:39:37.560713 2019 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:37.563255 kubelet[2019]: E1213 03:39:37.560739 2019 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9vdvk" Dec 13 03:39:37.563526 kubelet[2019]: E1213 03:39:37.560807 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9vdvk_calico-system(0511a489-3ef6-4634-bda9-6280d50164d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9vdvk_calico-system(0511a489-3ef6-4634-bda9-6280d50164d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:37.715451 kubelet[2019]: I1213 03:39:37.715034 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:39:37.716143 env[1140]: time="2024-12-13T03:39:37.715999595Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:39:37.716550 kubelet[2019]: I1213 03:39:37.716518 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:39:37.717010 env[1140]: time="2024-12-13T03:39:37.716939953Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:39:37.719134 kubelet[2019]: I1213 03:39:37.719107 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:39:37.719726 env[1140]: time="2024-12-13T03:39:37.719683851Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:39:37.724297 kubelet[2019]: I1213 03:39:37.724253 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:39:37.726517 env[1140]: time="2024-12-13T03:39:37.726485687Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:39:37.729390 kubelet[2019]: I1213 03:39:37.728951 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:39:37.729653 env[1140]: time="2024-12-13T03:39:37.729627573Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:39:37.732095 kubelet[2019]: I1213 03:39:37.731769 2019 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:39:37.732327 env[1140]: time="2024-12-13T03:39:37.732302592Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:39:37.826527 env[1140]: time="2024-12-13T03:39:37.826428250Z" level=error msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" failed" error="failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.827210 kubelet[2019]: E1213 03:39:37.826995 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:39:37.827210 kubelet[2019]: E1213 03:39:37.827085 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e"} Dec 13 03:39:37.827210 kubelet[2019]: E1213 03:39:37.827130 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.827210 kubelet[2019]: E1213 03:39:37.827164 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jdwm9" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" Dec 13 03:39:37.863657 env[1140]: time="2024-12-13T03:39:37.863598132Z" level=error msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" failed" error="failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.864257 kubelet[2019]: E1213 03:39:37.864065 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:39:37.864257 kubelet[2019]: E1213 03:39:37.864120 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f"} Dec 13 03:39:37.864257 kubelet[2019]: E1213 03:39:37.864177 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.864257 kubelet[2019]: E1213 03:39:37.864216 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" Dec 13 03:39:37.864666 env[1140]: time="2024-12-13T03:39:37.864629320Z" level=error msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" failed" error="failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.865063 kubelet[2019]: E1213 03:39:37.864907 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:39:37.865063 kubelet[2019]: E1213 03:39:37.864933 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1"} Dec 13 03:39:37.865063 kubelet[2019]: E1213 03:39:37.864972 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.865063 kubelet[2019]: E1213 03:39:37.865023 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" Dec 13 03:39:37.866893 env[1140]: time="2024-12-13T03:39:37.866858140Z" level=error msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" failed" error="failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.867462 kubelet[2019]: E1213 03:39:37.867207 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:39:37.867462 kubelet[2019]: E1213 03:39:37.867250 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a"} Dec 13 03:39:37.867462 kubelet[2019]: E1213 03:39:37.867390 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.867462 kubelet[2019]: E1213 03:39:37.867445 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:37.867814 env[1140]: time="2024-12-13T03:39:37.867782267Z" level=error msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" failed" error="failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.868184 kubelet[2019]: E1213 03:39:37.868036 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:39:37.868184 kubelet[2019]: E1213 03:39:37.868084 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50"} Dec 13 03:39:37.868184 kubelet[2019]: E1213 03:39:37.868118 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.868184 kubelet[2019]: E1213 03:39:37.868169 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" Dec 13 03:39:37.871876 env[1140]: time="2024-12-13T03:39:37.871834455Z" level=error msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" failed" error="failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:37.872518 kubelet[2019]: E1213 03:39:37.872197 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:39:37.872518 kubelet[2019]: E1213 03:39:37.872227 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad"} Dec 13 03:39:37.872518 kubelet[2019]: E1213 03:39:37.872294 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:37.872518 kubelet[2019]: E1213 03:39:37.872327 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9ldmh" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" Dec 13 03:39:44.924000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:44.926786 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 03:39:44.929549 kernel: audit: type=1400 audit(1734061184.924:910): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:44.924000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015fc040 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:44.945029 kernel: audit: type=1300 audit(1734061184.924:910): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015fc040 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:44.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:44.924000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:44.969755 kernel: audit: type=1327 audit(1734061184.924:910): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:44.969840 kernel: audit: type=1400 audit(1734061184.924:911): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:44.924000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00233eae0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:44.980994 kernel: audit: type=1300 audit(1734061184.924:911): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00233eae0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:44.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:44.994997 kernel: audit: type=1327 audit(1734061184.924:911): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:45.694000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.706011 kernel: audit: type=1400 audit(1734061185.694:912): avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.694000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007754090 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.720008 kernel: audit: type=1300 audit(1734061185.694:912): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007754090 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.694000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.734995 kernel: audit: type=1327 audit(1734061185.694:912): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.722000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.746013 kernel: audit: type=1400 audit(1734061185.722:913): avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.722000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003d9c360 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.722000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.744000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.744000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008aa9bc0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.744000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.758000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.758000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008aa9cb0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.762000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526907 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.762000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c008aa9fb0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.762000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:45.762000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:45.762000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c003d9c960 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:39:45.762000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:39:48.445495 env[1140]: time="2024-12-13T03:39:48.445394933Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:39:48.516828 env[1140]: time="2024-12-13T03:39:48.516743222Z" level=error msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" failed" error="failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:48.524237 kubelet[2019]: E1213 03:39:48.524192 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:39:48.525930 kubelet[2019]: E1213 03:39:48.525901 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f"} Dec 13 03:39:48.526031 kubelet[2019]: E1213 03:39:48.526013 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:48.528651 kubelet[2019]: E1213 03:39:48.528619 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" Dec 13 03:39:48.672097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount322316374.mount: Deactivated successfully. Dec 13 03:39:48.739492 env[1140]: time="2024-12-13T03:39:48.738955130Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:48.742961 env[1140]: time="2024-12-13T03:39:48.742920720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:48.746612 env[1140]: time="2024-12-13T03:39:48.746589262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:48.750531 env[1140]: time="2024-12-13T03:39:48.750501974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:39:48.752414 env[1140]: time="2024-12-13T03:39:48.752387376Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 03:39:48.844823 env[1140]: time="2024-12-13T03:39:48.844755655Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:39:48.884905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1054838491.mount: Deactivated successfully. Dec 13 03:39:48.897053 env[1140]: time="2024-12-13T03:39:48.896923738Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0\"" Dec 13 03:39:48.899809 env[1140]: time="2024-12-13T03:39:48.899708720Z" level=info msg="StartContainer for \"b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0\"" Dec 13 03:39:48.936772 systemd[1]: Started cri-containerd-b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0.scope. Dec 13 03:39:48.957000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:48.957000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:48.957000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015fc680 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:48.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:48.957000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:48.957000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00140f040 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:48.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:48.957000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015fc6a0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:48.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:48.958000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:39:48.958000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015fc6c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:39:48.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff700d74928 items=0 ppid=2466 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:48.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613636363436376262316331653039396536363933366466393164 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.975000 audit: BPF prog-id=136 op=LOAD Dec 13 03:39:48.975000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000388238 items=0 ppid=2466 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:48.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613636363436376262316331653039396536363933366466393164 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit: BPF prog-id=137 op=LOAD Dec 13 03:39:48.976000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000388288 items=0 ppid=2466 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:48.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613636363436376262316331653039396536363933366466393164 Dec 13 03:39:48.976000 audit: BPF prog-id=137 op=UNLOAD Dec 13 03:39:48.976000 audit: BPF prog-id=136 op=UNLOAD Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { perfmon } for pid=3087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit[3087]: AVC avc: denied { bpf } for pid=3087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:48.976000 audit: BPF prog-id=138 op=LOAD Dec 13 03:39:48.976000 audit[3087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000388318 items=0 ppid=2466 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:48.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613636363436376262316331653039396536363933366466393164 Dec 13 03:39:49.050615 env[1140]: time="2024-12-13T03:39:49.037950545Z" level=info msg="StartContainer for \"b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0\" returns successfully" Dec 13 03:39:49.693872 env[1140]: time="2024-12-13T03:39:49.693797740Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:39:49.694516 env[1140]: time="2024-12-13T03:39:49.694458181Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:39:49.696104 env[1140]: time="2024-12-13T03:39:49.694875454Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:39:49.696104 env[1140]: time="2024-12-13T03:39:49.695319830Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:39:49.755673 env[1140]: time="2024-12-13T03:39:49.755548030Z" level=error msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" failed" error="failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:49.756060 kubelet[2019]: E1213 03:39:49.756033 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:39:49.756408 kubelet[2019]: E1213 03:39:49.756099 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50"} Dec 13 03:39:49.756408 kubelet[2019]: E1213 03:39:49.756163 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:49.756408 kubelet[2019]: E1213 03:39:49.756201 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" Dec 13 03:39:49.769225 env[1140]: time="2024-12-13T03:39:49.769168800Z" level=error msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" failed" error="failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:49.769479 kubelet[2019]: E1213 03:39:49.769437 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:39:49.769540 kubelet[2019]: E1213 03:39:49.769498 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e"} Dec 13 03:39:49.769608 kubelet[2019]: E1213 03:39:49.769541 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:49.769608 kubelet[2019]: E1213 03:39:49.769593 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jdwm9" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" Dec 13 03:39:49.792224 env[1140]: time="2024-12-13T03:39:49.791135069Z" level=error msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" failed" error="failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:49.806577 kubelet[2019]: E1213 03:39:49.791369 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:39:49.806577 kubelet[2019]: E1213 03:39:49.791409 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a"} Dec 13 03:39:49.806577 kubelet[2019]: E1213 03:39:49.791453 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:49.806577 kubelet[2019]: E1213 03:39:49.791487 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:39:49.833503 env[1140]: time="2024-12-13T03:39:49.833432403Z" level=error msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" failed" error="failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:49.878216 kubelet[2019]: E1213 03:39:49.878177 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:39:49.878364 kubelet[2019]: E1213 03:39:49.878227 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad"} Dec 13 03:39:49.878364 kubelet[2019]: E1213 03:39:49.878269 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:49.878364 kubelet[2019]: E1213 03:39:49.878306 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9ldmh" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" Dec 13 03:39:49.911361 systemd[1]: run-containerd-runc-k8s.io-b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0-runc.85SLAN.mount: Deactivated successfully. Dec 13 03:39:50.223245 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 03:39:50.223395 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 03:39:50.337752 systemd[1]: cri-containerd-b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0.scope: Deactivated successfully. Dec 13 03:39:50.341000 audit: BPF prog-id=138 op=UNLOAD Dec 13 03:39:50.343626 kernel: kauditd_printk_skb: 69 callbacks suppressed Dec 13 03:39:50.343706 kernel: audit: type=1334 audit(1734061190.341:928): prog-id=138 op=UNLOAD Dec 13 03:39:50.363449 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0-rootfs.mount: Deactivated successfully. Dec 13 03:39:50.390932 env[1140]: time="2024-12-13T03:39:50.390857184Z" level=info msg="shim disconnected" id=b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0 Dec 13 03:39:50.391403 env[1140]: time="2024-12-13T03:39:50.391359467Z" level=warning msg="cleaning up after shim disconnected" id=b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0 namespace=k8s.io Dec 13 03:39:50.391567 env[1140]: time="2024-12-13T03:39:50.391534506Z" level=info msg="cleaning up dead shim" Dec 13 03:39:50.405283 env[1140]: time="2024-12-13T03:39:50.405214856Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:39:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3236 runtime=io.containerd.runc.v2\n" Dec 13 03:39:50.827611 kubelet[2019]: I1213 03:39:50.827567 2019 scope.go:117] "RemoveContainer" containerID="b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0" Dec 13 03:39:50.836478 env[1140]: time="2024-12-13T03:39:50.836399384Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 03:39:50.883456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23358805.mount: Deactivated successfully. Dec 13 03:39:50.906915 env[1140]: time="2024-12-13T03:39:50.906866717Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5\"" Dec 13 03:39:50.908322 env[1140]: time="2024-12-13T03:39:50.907633638Z" level=info msg="StartContainer for \"5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5\"" Dec 13 03:39:50.936006 systemd[1]: Started cri-containerd-5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5.scope. Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f14ec3f2838 items=0 ppid=2466 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:50.966505 kernel: audit: type=1400 audit(1734061190.954:929): avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.966601 kernel: audit: type=1300 audit(1734061190.954:929): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f14ec3f2838 items=0 ppid=2466 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:50.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333031326437363535373639313134343463396265336631613838 Dec 13 03:39:50.971682 kernel: audit: type=1327 audit(1734061190.954:929): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333031326437363535373639313134343463396265336631613838 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.975561 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.980814 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.980899 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.987405 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.993168 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.997005 kernel: audit: type=1400 audit(1734061190.954:930): avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.954000 audit: BPF prog-id=139 op=LOAD Dec 13 03:39:50.954000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c4078 items=0 ppid=2466 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:50.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333031326437363535373639313134343463396265336631613838 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit: BPF prog-id=140 op=LOAD Dec 13 03:39:50.956000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c40c8 items=0 ppid=2466 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:50.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333031326437363535373639313134343463396265336631613838 Dec 13 03:39:50.956000 audit: BPF prog-id=140 op=UNLOAD Dec 13 03:39:50.956000 audit: BPF prog-id=139 op=UNLOAD Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { perfmon } for pid=3257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit[3257]: AVC avc: denied { bpf } for pid=3257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:39:50.956000 audit: BPF prog-id=141 op=LOAD Dec 13 03:39:50.956000 audit[3257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c4158 items=0 ppid=2466 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:39:50.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333031326437363535373639313134343463396265336631613838 Dec 13 03:39:51.016054 env[1140]: time="2024-12-13T03:39:51.016003444Z" level=info msg="StartContainer for \"5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5\" returns successfully" Dec 13 03:39:51.093639 systemd[1]: cri-containerd-5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5.scope: Deactivated successfully. Dec 13 03:39:51.098000 audit: BPF prog-id=141 op=UNLOAD Dec 13 03:39:51.119763 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5-rootfs.mount: Deactivated successfully. Dec 13 03:39:51.140685 env[1140]: time="2024-12-13T03:39:51.140629232Z" level=info msg="shim disconnected" id=5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5 Dec 13 03:39:51.141009 env[1140]: time="2024-12-13T03:39:51.140959833Z" level=warning msg="cleaning up after shim disconnected" id=5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5 namespace=k8s.io Dec 13 03:39:51.141129 env[1140]: time="2024-12-13T03:39:51.141110074Z" level=info msg="cleaning up dead shim" Dec 13 03:39:51.152346 env[1140]: time="2024-12-13T03:39:51.152301849Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:39:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3303 runtime=io.containerd.runc.v2\n" Dec 13 03:39:51.832808 kubelet[2019]: I1213 03:39:51.832586 2019 scope.go:117] "RemoveContainer" containerID="b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0" Dec 13 03:39:51.833643 kubelet[2019]: I1213 03:39:51.833154 2019 scope.go:117] "RemoveContainer" containerID="5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5" Dec 13 03:39:51.835240 kubelet[2019]: E1213 03:39:51.834847 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-5lg9p_calico-system(47923824-8ac5-4b90-81de-1907599c98fd)\"" pod="calico-system/calico-node-5lg9p" podUID="47923824-8ac5-4b90-81de-1907599c98fd" Dec 13 03:39:51.837066 env[1140]: time="2024-12-13T03:39:51.836954733Z" level=info msg="RemoveContainer for \"b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0\"" Dec 13 03:39:51.852243 env[1140]: time="2024-12-13T03:39:51.852168353Z" level=info msg="RemoveContainer for \"b5a666467bb1c1e099e66936df91d67b361f25f30a50183832f574d4277ffed0\" returns successfully" Dec 13 03:39:52.840557 kubelet[2019]: I1213 03:39:52.840510 2019 scope.go:117] "RemoveContainer" containerID="5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5" Dec 13 03:39:52.844331 kubelet[2019]: E1213 03:39:52.842205 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-5lg9p_calico-system(47923824-8ac5-4b90-81de-1907599c98fd)\"" pod="calico-system/calico-node-5lg9p" podUID="47923824-8ac5-4b90-81de-1907599c98fd" Dec 13 03:39:53.416598 env[1140]: time="2024-12-13T03:39:53.416497708Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:39:53.484362 env[1140]: time="2024-12-13T03:39:53.484270775Z" level=error msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" failed" error="failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:53.485136 kubelet[2019]: E1213 03:39:53.485039 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:39:53.485136 kubelet[2019]: E1213 03:39:53.485138 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1"} Dec 13 03:39:53.485366 kubelet[2019]: E1213 03:39:53.485235 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:53.485366 kubelet[2019]: E1213 03:39:53.485307 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" Dec 13 03:39:59.416634 env[1140]: time="2024-12-13T03:39:59.416515523Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:39:59.481704 env[1140]: time="2024-12-13T03:39:59.481547728Z" level=error msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" failed" error="failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:39:59.482599 kubelet[2019]: E1213 03:39:59.482313 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:39:59.482599 kubelet[2019]: E1213 03:39:59.482386 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f"} Dec 13 03:39:59.482599 kubelet[2019]: E1213 03:39:59.482480 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:39:59.482599 kubelet[2019]: E1213 03:39:59.482551 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" Dec 13 03:40:03.417085 kubelet[2019]: I1213 03:40:03.417038 2019 scope.go:117] "RemoveContainer" containerID="5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5" Dec 13 03:40:03.417790 env[1140]: time="2024-12-13T03:40:03.417566785Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:03.426638 env[1140]: time="2024-12-13T03:40:03.426548673Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 03:40:03.464462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2324056768.mount: Deactivated successfully. Dec 13 03:40:03.477313 env[1140]: time="2024-12-13T03:40:03.477208454Z" level=info msg="CreateContainer within sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\"" Dec 13 03:40:03.480089 env[1140]: time="2024-12-13T03:40:03.480019623Z" level=info msg="StartContainer for \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\"" Dec 13 03:40:03.522107 env[1140]: time="2024-12-13T03:40:03.522040673Z" level=error msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" failed" error="failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:03.522331 kubelet[2019]: E1213 03:40:03.522302 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:03.522396 kubelet[2019]: E1213 03:40:03.522365 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a"} Dec 13 03:40:03.522429 kubelet[2019]: E1213 03:40:03.522407 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:03.522499 kubelet[2019]: E1213 03:40:03.522459 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:40:03.535031 systemd[1]: Started cri-containerd-f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea.scope. Dec 13 03:40:03.561122 kernel: kauditd_printk_skb: 35 callbacks suppressed Dec 13 03:40:03.561901 kernel: audit: type=1400 audit(1734061203.554:936): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f60585da8e8 items=0 ppid=2466 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:03.571251 kernel: audit: type=1300 audit(1734061203.554:936): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f60585da8e8 items=0 ppid=2466 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:03.571461 kernel: audit: type=1327 audit(1734061203.554:936): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333338343235376465303361663730383263623038336266306339 Dec 13 03:40:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333338343235376465303361663730383263623038336266306339 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.579233 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.579291 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.583146 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.589852 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.589963 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.596920 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.604305 kernel: audit: type=1400 audit(1734061203.554:937): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.554000 audit: BPF prog-id=142 op=LOAD Dec 13 03:40:03.554000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c4218 items=0 ppid=2466 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333338343235376465303361663730383263623038336266306339 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.555000 audit: BPF prog-id=143 op=LOAD Dec 13 03:40:03.555000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c4268 items=0 ppid=2466 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:03.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333338343235376465303361663730383263623038336266306339 Dec 13 03:40:03.556000 audit: BPF prog-id=143 op=UNLOAD Dec 13 03:40:03.556000 audit: BPF prog-id=142 op=UNLOAD Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:03.556000 audit: BPF prog-id=144 op=LOAD Dec 13 03:40:03.556000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c42f8 items=0 ppid=2466 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:03.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333338343235376465303361663730383263623038336266306339 Dec 13 03:40:03.612536 env[1140]: time="2024-12-13T03:40:03.612490745Z" level=info msg="StartContainer for \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\" returns successfully" Dec 13 03:40:03.707511 systemd[1]: cri-containerd-f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea.scope: Deactivated successfully. Dec 13 03:40:03.710000 audit: BPF prog-id=144 op=UNLOAD Dec 13 03:40:03.762329 env[1140]: time="2024-12-13T03:40:03.762248720Z" level=info msg="shim disconnected" id=f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea Dec 13 03:40:03.762329 env[1140]: time="2024-12-13T03:40:03.762305456Z" level=warning msg="cleaning up after shim disconnected" id=f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea namespace=k8s.io Dec 13 03:40:03.762329 env[1140]: time="2024-12-13T03:40:03.762316116Z" level=info msg="cleaning up dead shim" Dec 13 03:40:03.776801 env[1140]: time="2024-12-13T03:40:03.776709235Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:40:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3432 runtime=io.containerd.runc.v2\n" Dec 13 03:40:03.878514 kubelet[2019]: I1213 03:40:03.878468 2019 scope.go:117] "RemoveContainer" containerID="5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5" Dec 13 03:40:03.878884 kubelet[2019]: I1213 03:40:03.878833 2019 scope.go:117] "RemoveContainer" containerID="f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea" Dec 13 03:40:03.879444 kubelet[2019]: E1213 03:40:03.879408 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-5lg9p_calico-system(47923824-8ac5-4b90-81de-1907599c98fd)\"" pod="calico-system/calico-node-5lg9p" podUID="47923824-8ac5-4b90-81de-1907599c98fd" Dec 13 03:40:03.881670 env[1140]: time="2024-12-13T03:40:03.881621346Z" level=info msg="RemoveContainer for \"5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5\"" Dec 13 03:40:03.885754 env[1140]: time="2024-12-13T03:40:03.885707518Z" level=info msg="RemoveContainer for \"5e3012d765576911444c9be3f1a8888b2153009cc6ef6fa96f0ac497db4042c5\" returns successfully" Dec 13 03:40:04.417476 env[1140]: time="2024-12-13T03:40:04.417404592Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:04.418868 env[1140]: time="2024-12-13T03:40:04.418810291Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:04.420804 env[1140]: time="2024-12-13T03:40:04.420735626Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:04.452118 systemd[1]: run-containerd-runc-k8s.io-f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea-runc.Wtnb1j.mount: Deactivated successfully. Dec 13 03:40:04.452391 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea-rootfs.mount: Deactivated successfully. Dec 13 03:40:04.518712 env[1140]: time="2024-12-13T03:40:04.518647206Z" level=error msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" failed" error="failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:04.519311 kubelet[2019]: E1213 03:40:04.519095 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:04.519311 kubelet[2019]: E1213 03:40:04.519159 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad"} Dec 13 03:40:04.519311 kubelet[2019]: E1213 03:40:04.519223 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:04.519311 kubelet[2019]: E1213 03:40:04.519261 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9ldmh" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" Dec 13 03:40:04.529522 env[1140]: time="2024-12-13T03:40:04.529456083Z" level=error msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" failed" error="failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:04.529736 kubelet[2019]: E1213 03:40:04.529709 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:04.529828 kubelet[2019]: E1213 03:40:04.529758 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e"} Dec 13 03:40:04.529828 kubelet[2019]: E1213 03:40:04.529803 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:04.529957 kubelet[2019]: E1213 03:40:04.529848 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jdwm9" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" Dec 13 03:40:04.537270 env[1140]: time="2024-12-13T03:40:04.537216325Z" level=error msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" failed" error="failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:04.537843 kubelet[2019]: E1213 03:40:04.537660 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:04.537843 kubelet[2019]: E1213 03:40:04.537726 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50"} Dec 13 03:40:04.537843 kubelet[2019]: E1213 03:40:04.537771 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:04.537843 kubelet[2019]: E1213 03:40:04.537823 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" Dec 13 03:40:06.417892 env[1140]: time="2024-12-13T03:40:06.417739850Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:06.503387 env[1140]: time="2024-12-13T03:40:06.503311330Z" level=error msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" failed" error="failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:06.503698 kubelet[2019]: E1213 03:40:06.503657 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:06.503698 kubelet[2019]: E1213 03:40:06.503703 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1"} Dec 13 03:40:06.504383 kubelet[2019]: E1213 03:40:06.503770 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:06.504383 kubelet[2019]: E1213 03:40:06.503825 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" Dec 13 03:40:12.521806 systemd[1]: Started sshd@9-172.24.4.167:22-172.24.4.1:49264.service. Dec 13 03:40:12.533295 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 03:40:12.533405 kernel: audit: type=1130 audit(1734061212.521:943): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.167:22-172.24.4.1:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:12.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.167:22-172.24.4.1:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:13.418424 env[1140]: time="2024-12-13T03:40:13.417320551Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:40:13.488196 env[1140]: time="2024-12-13T03:40:13.487972536Z" level=error msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" failed" error="failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:13.488628 kubelet[2019]: E1213 03:40:13.488546 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:13.488628 kubelet[2019]: E1213 03:40:13.488630 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f"} Dec 13 03:40:13.489342 kubelet[2019]: E1213 03:40:13.488904 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:13.489342 kubelet[2019]: E1213 03:40:13.489020 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f1d0841-8d75-4c73-a853-4ede410b6584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podUID="2f1d0841-8d75-4c73-a853-4ede410b6584" Dec 13 03:40:13.866000 audit[3529]: USER_ACCT pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.882626 sshd[3529]: Accepted publickey for core from 172.24.4.1 port 49264 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:13.889107 kernel: audit: type=1101 audit(1734061213.866:944): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.889210 kernel: audit: type=1103 audit(1734061213.867:945): pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.867000 audit[3529]: CRED_ACQ pid=3529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.901713 sshd[3529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:13.903297 kernel: audit: type=1006 audit(1734061213.867:946): pid=3529 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 03:40:13.867000 audit[3529]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1a57bc70 a2=3 a3=0 items=0 ppid=1 pid=3529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:13.915789 kernel: audit: type=1300 audit(1734061213.867:946): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1a57bc70 a2=3 a3=0 items=0 ppid=1 pid=3529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:13.915969 kernel: audit: type=1327 audit(1734061213.867:946): proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:13.867000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:13.928641 systemd[1]: Started session-10.scope. Dec 13 03:40:13.930534 systemd-logind[1133]: New session 10 of user core. Dec 13 03:40:13.935000 audit[3529]: USER_START pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.948158 kernel: audit: type=1105 audit(1734061213.935:947): pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.948314 kernel: audit: type=1103 audit(1734061213.946:948): pid=3549 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:13.946000 audit[3549]: CRED_ACQ pid=3549 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:14.419318 env[1140]: time="2024-12-13T03:40:14.417535939Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:14.497567 env[1140]: time="2024-12-13T03:40:14.497510764Z" level=error msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" failed" error="failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:14.498058 kubelet[2019]: E1213 03:40:14.497902 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:14.498058 kubelet[2019]: E1213 03:40:14.497946 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a"} Dec 13 03:40:14.498058 kubelet[2019]: E1213 03:40:14.498004 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:14.498058 kubelet[2019]: E1213 03:40:14.498039 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0511a489-3ef6-4634-bda9-6280d50164d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9vdvk" podUID="0511a489-3ef6-4634-bda9-6280d50164d6" Dec 13 03:40:14.759687 sshd[3529]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:14.761000 audit[3529]: USER_END pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:14.761000 audit[3529]: CRED_DISP pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:14.775829 systemd-logind[1133]: Session 10 logged out. Waiting for processes to exit. Dec 13 03:40:14.777450 systemd[1]: sshd@9-172.24.4.167:22-172.24.4.1:49264.service: Deactivated successfully. Dec 13 03:40:14.778207 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 03:40:14.779921 systemd-logind[1133]: Removed session 10. Dec 13 03:40:14.787079 kernel: audit: type=1106 audit(1734061214.761:949): pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:14.787178 kernel: audit: type=1104 audit(1734061214.761:950): pid=3529 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:14.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.167:22-172.24.4.1:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:15.417055 env[1140]: time="2024-12-13T03:40:15.416927114Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:15.485185 env[1140]: time="2024-12-13T03:40:15.485062290Z" level=error msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" failed" error="failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:15.486590 kubelet[2019]: E1213 03:40:15.486258 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:15.486590 kubelet[2019]: E1213 03:40:15.486342 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad"} Dec 13 03:40:15.486590 kubelet[2019]: E1213 03:40:15.486440 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:15.486590 kubelet[2019]: E1213 03:40:15.486516 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"798eee9e-c412-481d-ae46-a472fa8e2ee0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9ldmh" podUID="798eee9e-c412-481d-ae46-a472fa8e2ee0" Dec 13 03:40:16.165539 env[1140]: time="2024-12-13T03:40:16.165496918Z" level=info msg="StopPodSandbox for \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\"" Dec 13 03:40:16.165700 env[1140]: time="2024-12-13T03:40:16.165573011Z" level=info msg="Container to stop \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 03:40:16.165700 env[1140]: time="2024-12-13T03:40:16.165591535Z" level=info msg="Container to stop \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 03:40:16.165700 env[1140]: time="2024-12-13T03:40:16.165605812Z" level=info msg="Container to stop \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 03:40:16.168500 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8-shm.mount: Deactivated successfully. Dec 13 03:40:16.178000 audit: BPF prog-id=122 op=UNLOAD Dec 13 03:40:16.179176 systemd[1]: cri-containerd-1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8.scope: Deactivated successfully. Dec 13 03:40:16.183000 audit: BPF prog-id=125 op=UNLOAD Dec 13 03:40:16.201790 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8-rootfs.mount: Deactivated successfully. Dec 13 03:40:16.232923 env[1140]: time="2024-12-13T03:40:16.232856245Z" level=info msg="shim disconnected" id=1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8 Dec 13 03:40:16.232923 env[1140]: time="2024-12-13T03:40:16.232918191Z" level=warning msg="cleaning up after shim disconnected" id=1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8 namespace=k8s.io Dec 13 03:40:16.233150 env[1140]: time="2024-12-13T03:40:16.232931045Z" level=info msg="cleaning up dead shim" Dec 13 03:40:16.245020 env[1140]: time="2024-12-13T03:40:16.244956491Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:40:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3616 runtime=io.containerd.runc.v2\n" Dec 13 03:40:16.245824 env[1140]: time="2024-12-13T03:40:16.245786770Z" level=info msg="TearDown network for sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" successfully" Dec 13 03:40:16.245824 env[1140]: time="2024-12-13T03:40:16.245818710Z" level=info msg="StopPodSandbox for \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" returns successfully" Dec 13 03:40:16.304362 kubelet[2019]: I1213 03:40:16.304321 2019 topology_manager.go:215] "Topology Admit Handler" podUID="9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb" podNamespace="calico-system" podName="calico-node-2jtpk" Dec 13 03:40:16.304927 kubelet[2019]: E1213 03:40:16.304911 2019 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="flexvol-driver" Dec 13 03:40:16.305035 kubelet[2019]: E1213 03:40:16.305024 2019 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.305112 kubelet[2019]: E1213 03:40:16.305102 2019 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="install-cni" Dec 13 03:40:16.305180 kubelet[2019]: E1213 03:40:16.305170 2019 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.305353 kubelet[2019]: I1213 03:40:16.305339 2019 memory_manager.go:354] "RemoveStaleState removing state" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.305437 kubelet[2019]: I1213 03:40:16.305426 2019 memory_manager.go:354] "RemoveStaleState removing state" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.305528 kubelet[2019]: E1213 03:40:16.305517 2019 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.305618 kubelet[2019]: I1213 03:40:16.305607 2019 memory_manager.go:354] "RemoveStaleState removing state" podUID="47923824-8ac5-4b90-81de-1907599c98fd" containerName="calico-node" Dec 13 03:40:16.312624 systemd[1]: Created slice kubepods-besteffort-pod9b854ceb_d8a0_4ad6_b1d4_d9cfabf5eaeb.slice. Dec 13 03:40:16.314444 kubelet[2019]: I1213 03:40:16.314410 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-lib-modules\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.417319 kubelet[2019]: I1213 03:40:16.416477 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-lib-modules\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.417521 kubelet[2019]: I1213 03:40:16.417506 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-net-dir\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.417670 kubelet[2019]: I1213 03:40:16.417658 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-log-dir\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.417784 kubelet[2019]: I1213 03:40:16.417772 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-lib-calico\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.417917 kubelet[2019]: I1213 03:40:16.417905 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/47923824-8ac5-4b90-81de-1907599c98fd-tigera-ca-bundle\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418041 kubelet[2019]: I1213 03:40:16.418030 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-run-calico\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418159 kubelet[2019]: I1213 03:40:16.418148 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-flexvol-driver-host\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418266 kubelet[2019]: I1213 03:40:16.418254 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-bin-dir\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418380 kubelet[2019]: I1213 03:40:16.418369 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-xtables-lock\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418493 kubelet[2019]: I1213 03:40:16.418480 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/47923824-8ac5-4b90-81de-1907599c98fd-node-certs\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418597 kubelet[2019]: I1213 03:40:16.418585 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-policysync\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418707 kubelet[2019]: I1213 03:40:16.418696 2019 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-b5km2\" (UniqueName: \"kubernetes.io/projected/47923824-8ac5-4b90-81de-1907599c98fd-kube-api-access-b5km2\") pod \"47923824-8ac5-4b90-81de-1907599c98fd\" (UID: \"47923824-8ac5-4b90-81de-1907599c98fd\") " Dec 13 03:40:16.418851 kubelet[2019]: I1213 03:40:16.418829 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-tigera-ca-bundle\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.418952 kubelet[2019]: I1213 03:40:16.418940 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-xtables-lock\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419086 kubelet[2019]: I1213 03:40:16.419074 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-node-certs\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419203 kubelet[2019]: I1213 03:40:16.419192 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-policysync\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419326 kubelet[2019]: I1213 03:40:16.419314 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-cni-bin-dir\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419445 kubelet[2019]: I1213 03:40:16.419433 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-flexvol-driver-host\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419741 kubelet[2019]: I1213 03:40:16.419705 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-cni-net-dir\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419861 kubelet[2019]: I1213 03:40:16.419841 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-var-lib-calico\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419921 kubelet[2019]: I1213 03:40:16.419911 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hq5m9\" (UniqueName: \"kubernetes.io/projected/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-kube-api-access-hq5m9\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.419997 kubelet[2019]: I1213 03:40:16.419965 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-cni-log-dir\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.420079 kubelet[2019]: I1213 03:40:16.420061 2019 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb-var-run-calico\") pod \"calico-node-2jtpk\" (UID: \"9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb\") " pod="calico-system/calico-node-2jtpk" Dec 13 03:40:16.422924 kubelet[2019]: I1213 03:40:16.419553 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.424358 kubelet[2019]: I1213 03:40:16.424336 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-policysync" (OuterVolumeSpecName: "policysync") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.431280 kubelet[2019]: I1213 03:40:16.431236 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.431495 kubelet[2019]: I1213 03:40:16.431477 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.431627 kubelet[2019]: I1213 03:40:16.431611 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.434248 systemd[1]: var-lib-kubelet-pods-47923824\x2d8ac5\x2d4b90\x2d81de\x2d1907599c98fd-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 03:40:16.439766 kubelet[2019]: I1213 03:40:16.439718 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.439934 kubelet[2019]: I1213 03:40:16.439799 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.439934 kubelet[2019]: I1213 03:40:16.439848 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.439934 kubelet[2019]: I1213 03:40:16.439902 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 03:40:16.441082 kubelet[2019]: I1213 03:40:16.440859 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/47923824-8ac5-4b90-81de-1907599c98fd-node-certs" (OuterVolumeSpecName: "node-certs") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 03:40:16.445495 systemd[1]: var-lib-kubelet-pods-47923824\x2d8ac5\x2d4b90\x2d81de\x2d1907599c98fd-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2db5km2.mount: Deactivated successfully. Dec 13 03:40:16.455200 systemd[1]: var-lib-kubelet-pods-47923824\x2d8ac5\x2d4b90\x2d81de\x2d1907599c98fd-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 03:40:16.457875 kubelet[2019]: I1213 03:40:16.457817 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/47923824-8ac5-4b90-81de-1907599c98fd-kube-api-access-b5km2" (OuterVolumeSpecName: "kube-api-access-b5km2") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "kube-api-access-b5km2". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 03:40:16.459007 kubelet[2019]: I1213 03:40:16.458964 2019 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/47923824-8ac5-4b90-81de-1907599c98fd-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "47923824-8ac5-4b90-81de-1907599c98fd" (UID: "47923824-8ac5-4b90-81de-1907599c98fd"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 03:40:16.521590 kubelet[2019]: I1213 03:40:16.521541 2019 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-flexvol-driver-host\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521736 kubelet[2019]: I1213 03:40:16.521620 2019 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/47923824-8ac5-4b90-81de-1907599c98fd-tigera-ca-bundle\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521736 kubelet[2019]: I1213 03:40:16.521656 2019 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/47923824-8ac5-4b90-81de-1907599c98fd-node-certs\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521736 kubelet[2019]: I1213 03:40:16.521689 2019 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-lib-modules\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521736 kubelet[2019]: I1213 03:40:16.521720 2019 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-log-dir\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521891 kubelet[2019]: I1213 03:40:16.521749 2019 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-net-dir\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521891 kubelet[2019]: I1213 03:40:16.521778 2019 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-lib-calico\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521891 kubelet[2019]: I1213 03:40:16.521808 2019 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-var-run-calico\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521891 kubelet[2019]: I1213 03:40:16.521838 2019 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-cni-bin-dir\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.521891 kubelet[2019]: I1213 03:40:16.521872 2019 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-xtables-lock\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.522085 kubelet[2019]: I1213 03:40:16.521902 2019 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/47923824-8ac5-4b90-81de-1907599c98fd-policysync\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.522085 kubelet[2019]: I1213 03:40:16.521936 2019 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-b5km2\" (UniqueName: \"kubernetes.io/projected/47923824-8ac5-4b90-81de-1907599c98fd-kube-api-access-b5km2\") on node \"ci-3510-3-6-5-2a90ac038f.novalocal\" DevicePath \"\"" Dec 13 03:40:16.620821 env[1140]: time="2024-12-13T03:40:16.620712987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2jtpk,Uid:9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb,Namespace:calico-system,Attempt:0,}" Dec 13 03:40:16.655269 env[1140]: time="2024-12-13T03:40:16.655057974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:16.655562 env[1140]: time="2024-12-13T03:40:16.655295109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:16.655562 env[1140]: time="2024-12-13T03:40:16.655448257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:16.656327 env[1140]: time="2024-12-13T03:40:16.656239572Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa pid=3642 runtime=io.containerd.runc.v2 Dec 13 03:40:16.700602 systemd[1]: Started cri-containerd-876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa.scope. Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.717000 audit: BPF prog-id=145 op=LOAD Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366531393738386431343161626563353262313632393739653633 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366531393738386431343161626563353262313632393739653633 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.719000 audit: BPF prog-id=146 op=LOAD Dec 13 03:40:16.719000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000275d90 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366531393738386431343161626563353262313632393739653633 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit: BPF prog-id=147 op=LOAD Dec 13 03:40:16.720000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000275dd8 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366531393738386431343161626563353262313632393739653633 Dec 13 03:40:16.720000 audit: BPF prog-id=147 op=UNLOAD Dec 13 03:40:16.720000 audit: BPF prog-id=146 op=UNLOAD Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.720000 audit: BPF prog-id=148 op=LOAD Dec 13 03:40:16.720000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ce1e8 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366531393738386431343161626563353262313632393739653633 Dec 13 03:40:16.739019 env[1140]: time="2024-12-13T03:40:16.738947253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2jtpk,Uid:9b854ceb-d8a0-4ad6-b1d4-d9cfabf5eaeb,Namespace:calico-system,Attempt:0,} returns sandbox id \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\"" Dec 13 03:40:16.746108 env[1140]: time="2024-12-13T03:40:16.746062100Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 03:40:16.769081 env[1140]: time="2024-12-13T03:40:16.769029819Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad\"" Dec 13 03:40:16.769787 env[1140]: time="2024-12-13T03:40:16.769761332Z" level=info msg="StartContainer for \"b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad\"" Dec 13 03:40:16.790421 systemd[1]: Started cri-containerd-b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad.scope. Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9483670088 items=0 ppid=3642 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373266396236366430313736636339333562366436393035656130 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit: BPF prog-id=149 op=LOAD Dec 13 03:40:16.815000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038a748 items=0 ppid=3642 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373266396236366430313736636339333562366436393035656130 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.815000 audit: BPF prog-id=150 op=LOAD Dec 13 03:40:16.815000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038a798 items=0 ppid=3642 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373266396236366430313736636339333562366436393035656130 Dec 13 03:40:16.816000 audit: BPF prog-id=150 op=UNLOAD Dec 13 03:40:16.816000 audit: BPF prog-id=149 op=UNLOAD Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { perfmon } for pid=3682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit[3682]: AVC avc: denied { bpf } for pid=3682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:16.816000 audit: BPF prog-id=151 op=LOAD Dec 13 03:40:16.816000 audit[3682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038a828 items=0 ppid=3642 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:16.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234373266396236366430313736636339333562366436393035656130 Dec 13 03:40:16.842225 env[1140]: time="2024-12-13T03:40:16.842163285Z" level=info msg="StartContainer for \"b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad\" returns successfully" Dec 13 03:40:16.933547 kubelet[2019]: I1213 03:40:16.933467 2019 scope.go:117] "RemoveContainer" containerID="f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea" Dec 13 03:40:16.935190 env[1140]: time="2024-12-13T03:40:16.935163359Z" level=info msg="RemoveContainer for \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\"" Dec 13 03:40:16.947622 env[1140]: time="2024-12-13T03:40:16.947584026Z" level=info msg="RemoveContainer for \"f33384257de03af7082cb083bf0c9e4fb5de015a0f8eb0cd95b1d211069793ea\" returns successfully" Dec 13 03:40:16.948783 kubelet[2019]: I1213 03:40:16.948763 2019 scope.go:117] "RemoveContainer" containerID="53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786" Dec 13 03:40:16.950030 env[1140]: time="2024-12-13T03:40:16.949959126Z" level=info msg="RemoveContainer for \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\"" Dec 13 03:40:16.951960 systemd[1]: Removed slice kubepods-besteffort-pod47923824_8ac5_4b90_81de_1907599c98fd.slice. Dec 13 03:40:16.952143 systemd[1]: kubepods-besteffort-pod47923824_8ac5_4b90_81de_1907599c98fd.slice: Consumed 1.284s CPU time. Dec 13 03:40:16.957906 env[1140]: time="2024-12-13T03:40:16.957768556Z" level=info msg="RemoveContainer for \"53c6e5b9dc613a70e40a8452a9b36cbd4c073044f959537f762bcab4f251a786\" returns successfully" Dec 13 03:40:16.962088 kubelet[2019]: I1213 03:40:16.962034 2019 scope.go:117] "RemoveContainer" containerID="9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c" Dec 13 03:40:16.965342 env[1140]: time="2024-12-13T03:40:16.965302601Z" level=info msg="RemoveContainer for \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\"" Dec 13 03:40:16.969167 env[1140]: time="2024-12-13T03:40:16.969131479Z" level=info msg="RemoveContainer for \"9ee15886a6be73654b95116c69516e25c37d5657b49d90d7a03684cf2d41487c\" returns successfully" Dec 13 03:40:16.978801 systemd[1]: cri-containerd-b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad.scope: Deactivated successfully. Dec 13 03:40:16.982000 audit: BPF prog-id=151 op=UNLOAD Dec 13 03:40:17.071797 env[1140]: time="2024-12-13T03:40:17.071727715Z" level=info msg="shim disconnected" id=b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad Dec 13 03:40:17.071797 env[1140]: time="2024-12-13T03:40:17.071782007Z" level=warning msg="cleaning up after shim disconnected" id=b472f9b66d0176cc935b6d6905ea0d97fcc25714389dd8cd49bca6667bc618ad namespace=k8s.io Dec 13 03:40:17.071797 env[1140]: time="2024-12-13T03:40:17.071793278Z" level=info msg="cleaning up dead shim" Dec 13 03:40:17.082235 env[1140]: time="2024-12-13T03:40:17.082179487Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:40:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3724 runtime=io.containerd.runc.v2\n" Dec 13 03:40:17.962773 env[1140]: time="2024-12-13T03:40:17.962675577Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 03:40:18.013853 env[1140]: time="2024-12-13T03:40:18.013128232Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94\"" Dec 13 03:40:18.015024 env[1140]: time="2024-12-13T03:40:18.014523742Z" level=info msg="StartContainer for \"5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94\"" Dec 13 03:40:18.052612 systemd[1]: Started cri-containerd-5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94.scope. Dec 13 03:40:18.083506 kernel: kauditd_printk_skb: 104 callbacks suppressed Dec 13 03:40:18.083653 kernel: audit: type=1400 audit(1734061218.077:979): avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2a3dddef58 items=0 ppid=3642 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:18.089807 kernel: audit: type=1300 audit(1734061218.077:979): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2a3dddef58 items=0 ppid=3642 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:18.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313761643730343235643738663130666534313530663165356638 Dec 13 03:40:18.096008 kernel: audit: type=1327 audit(1734061218.077:979): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313761643730343235643738663130666534313530663165356638 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.101034 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.109418 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.109491 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.109526 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.113840 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.121191 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.125171 kernel: audit: type=1400 audit(1734061218.077:980): avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.077000 audit: BPF prog-id=152 op=LOAD Dec 13 03:40:18.077000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000396f08 items=0 ppid=3642 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:18.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313761643730343235643738663130666534313530663165356638 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.078000 audit: BPF prog-id=153 op=LOAD Dec 13 03:40:18.078000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000396f58 items=0 ppid=3642 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:18.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313761643730343235643738663130666534313530663165356638 Dec 13 03:40:18.082000 audit: BPF prog-id=153 op=UNLOAD Dec 13 03:40:18.082000 audit: BPF prog-id=152 op=UNLOAD Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:18.082000 audit: BPF prog-id=154 op=LOAD Dec 13 03:40:18.082000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000396fe8 items=0 ppid=3642 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:18.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313761643730343235643738663130666534313530663165356638 Dec 13 03:40:18.135509 env[1140]: time="2024-12-13T03:40:18.135473679Z" level=info msg="StartContainer for \"5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94\" returns successfully" Dec 13 03:40:18.418108 env[1140]: time="2024-12-13T03:40:18.418037683Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:18.421858 kubelet[2019]: I1213 03:40:18.421813 2019 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="47923824-8ac5-4b90-81de-1907599c98fd" path="/var/lib/kubelet/pods/47923824-8ac5-4b90-81de-1907599c98fd/volumes" Dec 13 03:40:18.480457 env[1140]: time="2024-12-13T03:40:18.479955329Z" level=error msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" failed" error="failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:18.481033 kubelet[2019]: E1213 03:40:18.480813 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:18.481033 kubelet[2019]: E1213 03:40:18.480874 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e"} Dec 13 03:40:18.481033 kubelet[2019]: E1213 03:40:18.480921 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:18.481033 kubelet[2019]: E1213 03:40:18.480996 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee472d7b-bab8-4369-b29f-b404b9bc9acc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-jdwm9" podUID="ee472d7b-bab8-4369-b29f-b404b9bc9acc" Dec 13 03:40:19.417108 env[1140]: time="2024-12-13T03:40:19.417020404Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:19.469108 env[1140]: time="2024-12-13T03:40:19.469023939Z" level=error msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" failed" error="failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:19.469837 kubelet[2019]: E1213 03:40:19.469585 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:19.469837 kubelet[2019]: E1213 03:40:19.469652 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50"} Dec 13 03:40:19.469837 kubelet[2019]: E1213 03:40:19.469728 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:19.469837 kubelet[2019]: E1213 03:40:19.469785 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae02de06-006f-4364-afd7-4f696b4572fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podUID="ae02de06-006f-4364-afd7-4f696b4572fa" Dec 13 03:40:19.769173 systemd[1]: Started sshd@10-172.24.4.167:22-172.24.4.1:48408.service. Dec 13 03:40:19.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.167:22-172.24.4.1:48408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:21.416393 env[1140]: time="2024-12-13T03:40:21.416284552Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:21.468000 audit[3815]: USER_ACCT pid=3815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:21.469460 sshd[3815]: Accepted publickey for core from 172.24.4.1 port 48408 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:21.471000 audit[3815]: CRED_ACQ pid=3815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:21.471000 audit[3815]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01217950 a2=3 a3=0 items=0 ppid=1 pid=3815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:21.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:21.474150 env[1140]: time="2024-12-13T03:40:21.474050841Z" level=error msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" failed" error="failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 03:40:21.475102 kubelet[2019]: E1213 03:40:21.474691 2019 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:21.475102 kubelet[2019]: E1213 03:40:21.474865 2019 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1"} Dec 13 03:40:21.475102 kubelet[2019]: E1213 03:40:21.474937 2019 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 03:40:21.475102 kubelet[2019]: E1213 03:40:21.475029 2019 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podUID="a0d1c06e-1ad7-45d6-8d62-f5a66cad1314" Dec 13 03:40:21.475725 sshd[3815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:21.486811 systemd-logind[1133]: New session 11 of user core. Dec 13 03:40:21.487301 systemd[1]: Started session-11.scope. Dec 13 03:40:21.493000 audit[3815]: USER_START pid=3815 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:21.495000 audit[3837]: CRED_ACQ pid=3837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:21.505068 systemd[1]: cri-containerd-5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94.scope: Deactivated successfully. Dec 13 03:40:21.505336 systemd[1]: cri-containerd-5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94.scope: Consumed 1.421s CPU time. Dec 13 03:40:21.507000 audit: BPF prog-id=154 op=UNLOAD Dec 13 03:40:21.536512 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94-rootfs.mount: Deactivated successfully. Dec 13 03:40:21.580952 env[1140]: time="2024-12-13T03:40:21.580899076Z" level=info msg="shim disconnected" id=5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94 Dec 13 03:40:21.581344 env[1140]: time="2024-12-13T03:40:21.581309427Z" level=warning msg="cleaning up after shim disconnected" id=5f17ad70425d78f10fe4150f1e5f8cc9bbb7bdedd7f3a64c26c89b5bf3b28a94 namespace=k8s.io Dec 13 03:40:21.581455 env[1140]: time="2024-12-13T03:40:21.581438830Z" level=info msg="cleaning up dead shim" Dec 13 03:40:21.598454 env[1140]: time="2024-12-13T03:40:21.598363451Z" level=warning msg="cleanup warnings time=\"2024-12-13T03:40:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3852 runtime=io.containerd.runc.v2\n" Dec 13 03:40:22.025487 env[1140]: time="2024-12-13T03:40:22.024622643Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 03:40:22.093005 env[1140]: time="2024-12-13T03:40:22.092938464Z" level=info msg="CreateContainer within sandbox \"876e19788d141abec52b162979e63d5e6c9f9366ed27f73ff9225e514d26d6fa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7\"" Dec 13 03:40:22.094681 env[1140]: time="2024-12-13T03:40:22.094619570Z" level=info msg="StartContainer for \"0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7\"" Dec 13 03:40:22.129806 systemd[1]: Started cri-containerd-0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7.scope. Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f668216c4f8 items=0 ppid=3642 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:22.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663435386266353935373238373761323732323230663165313330 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.155000 audit: BPF prog-id=155 op=LOAD Dec 13 03:40:22.155000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00027ff68 items=0 ppid=3642 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:22.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663435386266353935373238373761323732323230663165313330 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit: BPF prog-id=156 op=LOAD Dec 13 03:40:22.156000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00027ffb8 items=0 ppid=3642 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663435386266353935373238373761323732323230663165313330 Dec 13 03:40:22.156000 audit: BPF prog-id=156 op=UNLOAD Dec 13 03:40:22.156000 audit: BPF prog-id=155 op=UNLOAD Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:22.156000 audit: BPF prog-id=157 op=LOAD Dec 13 03:40:22.156000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00035e048 items=0 ppid=3642 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663435386266353935373238373761323732323230663165313330 Dec 13 03:40:22.196272 env[1140]: time="2024-12-13T03:40:22.196218599Z" level=info msg="StartContainer for \"0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7\" returns successfully" Dec 13 03:40:22.845251 sshd[3815]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:22.845000 audit[3815]: USER_END pid=3815 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:22.845000 audit[3815]: CRED_DISP pid=3815 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:22.849382 systemd[1]: sshd@10-172.24.4.167:22-172.24.4.1:48408.service: Deactivated successfully. Dec 13 03:40:22.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.167:22-172.24.4.1:48408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:22.850237 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 03:40:22.851519 systemd-logind[1133]: Session 11 logged out. Waiting for processes to exit. Dec 13 03:40:22.853545 systemd-logind[1133]: Removed session 11. Dec 13 03:40:23.060379 kubelet[2019]: I1213 03:40:23.060220 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-2jtpk" podStartSLOduration=7.036413859 podStartE2EDuration="7.036413859s" podCreationTimestamp="2024-12-13 03:40:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:40:23.033510639 +0000 UTC m=+90.809399920" watchObservedRunningTime="2024-12-13 03:40:23.036413859 +0000 UTC m=+90.812303120" Dec 13 03:40:23.065168 systemd[1]: run-containerd-runc-k8s.io-0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7-runc.Zz06Z0.mount: Deactivated successfully. Dec 13 03:40:24.004000 audit[4024]: AVC avc: denied { write } for pid=4024 comm="tee" name="fd" dev="proc" ino=28225 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.006432 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 03:40:24.006503 kernel: audit: type=1400 audit(1734061224.004:1001): avc: denied { write } for pid=4024 comm="tee" name="fd" dev="proc" ino=28225 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.022420 kernel: audit: type=1300 audit(1734061224.004:1001): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0eadc9f4 a2=241 a3=1b6 items=1 ppid=3973 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.004000 audit[4024]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0eadc9f4 a2=241 a3=1b6 items=1 ppid=3973 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.059021 kernel: audit: type=1307 audit(1734061224.004:1001): cwd="/etc/service/enabled/confd/log" Dec 13 03:40:24.059096 kernel: audit: type=1302 audit(1734061224.004:1001): item=0 name="/dev/fd/63" inode=28213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.059123 kernel: audit: type=1400 audit(1734061224.015:1002): avc: denied { write } for pid=4026 comm="tee" name="fd" dev="proc" ino=29235 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.059152 kernel: audit: type=1300 audit(1734061224.015:1002): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe640019e4 a2=241 a3=1b6 items=1 ppid=3966 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.004000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 03:40:24.004000 audit: PATH item=0 name="/dev/fd/63" inode=28213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.100750 kernel: audit: type=1307 audit(1734061224.015:1002): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:40:24.100837 kernel: audit: type=1302 audit(1734061224.015:1002): item=0 name="/dev/fd/63" inode=29226 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.100860 kernel: audit: type=1327 audit(1734061224.015:1002): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.100883 kernel: audit: type=1400 audit(1734061224.015:1003): avc: denied { write } for pid=4029 comm="tee" name="fd" dev="proc" ino=29239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.015000 audit[4026]: AVC avc: denied { write } for pid=4026 comm="tee" name="fd" dev="proc" ino=29235 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.015000 audit[4026]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe640019e4 a2=241 a3=1b6 items=1 ppid=3966 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.015000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 03:40:24.015000 audit: PATH item=0 name="/dev/fd/63" inode=29226 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.015000 audit[4029]: AVC avc: denied { write } for pid=4029 comm="tee" name="fd" dev="proc" ino=29239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.015000 audit[4029]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9bf649f5 a2=241 a3=1b6 items=1 ppid=3970 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.015000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 03:40:24.015000 audit: PATH item=0 name="/dev/fd/63" inode=28214 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.015000 audit[4033]: AVC avc: denied { write } for pid=4033 comm="tee" name="fd" dev="proc" ino=29243 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.015000 audit[4033]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6e449f6 a2=241 a3=1b6 items=1 ppid=3964 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.015000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 03:40:24.015000 audit: PATH item=0 name="/dev/fd/63" inode=28215 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.021000 audit[4034]: AVC avc: denied { write } for pid=4034 comm="tee" name="fd" dev="proc" ino=29247 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.021000 audit[4034]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddbfc89f4 a2=241 a3=1b6 items=1 ppid=3967 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.021000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 03:40:24.021000 audit: PATH item=0 name="/dev/fd/63" inode=29228 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.027000 audit[4030]: AVC avc: denied { write } for pid=4030 comm="tee" name="fd" dev="proc" ino=28257 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.027000 audit[4030]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb44919e5 a2=241 a3=1b6 items=1 ppid=3968 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.027000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 03:40:24.027000 audit: PATH item=0 name="/dev/fd/63" inode=29227 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.004000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.031000 audit[4023]: AVC avc: denied { write } for pid=4023 comm="tee" name="fd" dev="proc" ino=29251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 03:40:24.031000 audit[4023]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5d9279f4 a2=241 a3=1b6 items=1 ppid=3977 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.031000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 03:40:24.031000 audit: PATH item=0 name="/dev/fd/63" inode=29225 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 03:40:24.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 03:40:24.025177 systemd[1]: run-containerd-runc-k8s.io-0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7-runc.7ksm4i.mount: Deactivated successfully. Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.466000 audit: BPF prog-id=158 op=LOAD Dec 13 03:40:24.466000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce89f9930 a2=98 a3=3 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.466000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.466000 audit: BPF prog-id=158 op=UNLOAD Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.469000 audit: BPF prog-id=159 op=LOAD Dec 13 03:40:24.469000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce89f9710 a2=74 a3=540051 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.469000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.470000 audit: BPF prog-id=159 op=UNLOAD Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.470000 audit: BPF prog-id=160 op=LOAD Dec 13 03:40:24.470000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce89f9740 a2=94 a3=2 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.470000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.470000 audit: BPF prog-id=160 op=UNLOAD Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.610000 audit: BPF prog-id=161 op=LOAD Dec 13 03:40:24.610000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce89f9600 a2=40 a3=1 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.611000 audit: BPF prog-id=161 op=UNLOAD Dec 13 03:40:24.611000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.611000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffce89f96d0 a2=50 a3=7ffce89f97b0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f9610 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce89f9640 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce89f9550 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f9660 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f9640 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f9630 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f9660 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce89f9640 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce89f9660 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffce89f9630 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.622000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.622000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce89f96a0 a2=28 a3=0 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.622000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffce89f9450 a2=50 a3=1 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.624000 audit: BPF prog-id=162 op=LOAD Dec 13 03:40:24.624000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce89f9450 a2=94 a3=5 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.624000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.625000 audit: BPF prog-id=162 op=UNLOAD Dec 13 03:40:24.625000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.625000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffce89f9500 a2=50 a3=1 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.625000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.625000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.625000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffce89f9620 a2=4 a3=38 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.625000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.626000 audit[4097]: AVC avc: denied { confidentiality } for pid=4097 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:40:24.626000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce89f9670 a2=94 a3=6 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.626000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { confidentiality } for pid=4097 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:40:24.627000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce89f8e20 a2=94 a3=83 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { perfmon } for pid=4097 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { bpf } for pid=4097 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.627000 audit[4097]: AVC avc: denied { confidentiality } for pid=4097 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:40:24.627000 audit[4097]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffce89f8e20 a2=94 a3=83 items=0 ppid=3971 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.627000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit: BPF prog-id=163 op=LOAD Dec 13 03:40:24.645000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcff6580 a2=98 a3=1999999999999999 items=0 ppid=3971 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.645000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:40:24.645000 audit: BPF prog-id=163 op=UNLOAD Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.645000 audit: BPF prog-id=164 op=LOAD Dec 13 03:40:24.645000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcff6460 a2=74 a3=ffff items=0 ppid=3971 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.645000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:40:24.646000 audit: BPF prog-id=164 op=UNLOAD Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.646000 audit: BPF prog-id=165 op=LOAD Dec 13 03:40:24.646000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcff64a0 a2=40 a3=7ffedcff6680 items=0 ppid=3971 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.646000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 03:40:24.646000 audit: BPF prog-id=165 op=UNLOAD Dec 13 03:40:24.757364 systemd-networkd[979]: vxlan.calico: Link UP Dec 13 03:40:24.757378 systemd-networkd[979]: vxlan.calico: Gained carrier Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.763000 audit: BPF prog-id=166 op=LOAD Dec 13 03:40:24.763000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b920db0 a2=98 a3=100 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.765000 audit: BPF prog-id=166 op=UNLOAD Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit: BPF prog-id=167 op=LOAD Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b920bc0 a2=74 a3=540051 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit: BPF prog-id=167 op=UNLOAD Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit: BPF prog-id=168 op=LOAD Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b920bf0 a2=94 a3=2 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit: BPF prog-id=168 op=UNLOAD Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920ac0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b920af0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b920a00 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920b10 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920af0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920ae0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920b10 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.766000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.766000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b920af0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.766000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b920b10 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.767000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b920ae0 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.767000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9b920b50 a2=28 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.767000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.767000 audit: BPF prog-id=169 op=LOAD Dec 13 03:40:24.767000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9b9209c0 a2=40 a3=0 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.767000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.767000 audit: BPF prog-id=169 op=UNLOAD Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe9b9209b0 a2=50 a3=2800 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.768000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe9b9209b0 a2=50 a3=2800 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.768000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.768000 audit: BPF prog-id=170 op=LOAD Dec 13 03:40:24.768000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9b9201d0 a2=94 a3=2 items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.768000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.769000 audit: BPF prog-id=170 op=UNLOAD Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.769000 audit: BPF prog-id=171 op=LOAD Dec 13 03:40:24.769000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9b9202d0 a2=94 a3=2d items=0 ppid=3971 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.769000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.775000 audit: BPF prog-id=172 op=LOAD Dec 13 03:40:24.775000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff3cd96520 a2=98 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.775000 audit: BPF prog-id=172 op=UNLOAD Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit: BPF prog-id=173 op=LOAD Dec 13 03:40:24.776000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3cd96300 a2=74 a3=540051 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.776000 audit: BPF prog-id=173 op=UNLOAD Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.776000 audit: BPF prog-id=174 op=LOAD Dec 13 03:40:24.776000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3cd96330 a2=94 a3=2 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.776000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.776000 audit: BPF prog-id=174 op=UNLOAD Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.924000 audit: BPF prog-id=175 op=LOAD Dec 13 03:40:24.924000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff3cd961f0 a2=40 a3=1 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.924000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.925000 audit: BPF prog-id=175 op=UNLOAD Dec 13 03:40:24.925000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.925000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff3cd962c0 a2=50 a3=7fff3cd963a0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96200 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3cd96230 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3cd96140 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96250 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96230 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96220 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96250 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3cd96230 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3cd96250 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff3cd96220 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff3cd96290 a2=28 a3=0 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3cd96040 a2=50 a3=1 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit: BPF prog-id=176 op=LOAD Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff3cd96040 a2=94 a3=5 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit: BPF prog-id=176 op=UNLOAD Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff3cd960f0 a2=50 a3=1 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff3cd96210 a2=4 a3=38 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.934000 audit[4130]: AVC avc: denied { confidentiality } for pid=4130 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:40:24.934000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3cd96260 a2=94 a3=6 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { confidentiality } for pid=4130 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 03:40:24.935000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3cd95a10 a2=94 a3=83 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff3cd95a10 a2=94 a3=83 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.935000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.935000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3cd97450 a2=10 a3=f0f1 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.936000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.936000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3cd972f0 a2=10 a3=3 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.936000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.936000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.936000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3cd97290 a2=10 a3=3 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.936000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.936000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:24.936000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff3cd97290 a2=10 a3=7 items=0 ppid=3971 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:24.936000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 03:40:24.944000 audit: BPF prog-id=171 op=UNLOAD Dec 13 03:40:25.014000 audit[4158]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:25.014000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffaa0ba780 a2=0 a3=7fffaa0ba76c items=0 ppid=3971 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:25.014000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:25.028000 audit[4159]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:25.028000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdff0cd0d0 a2=0 a3=7ffdff0cd0bc items=0 ppid=3971 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:25.028000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:25.036000 audit[4157]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4157 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:25.036000 audit[4157]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf2f40030 a2=0 a3=7ffcf2f4001c items=0 ppid=3971 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:25.036000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:25.047000 audit[4156]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:25.047000 audit[4156]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd7a829170 a2=0 a3=7ffd7a82915c items=0 ppid=3971 pid=4156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:25.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:26.550379 systemd-networkd[979]: vxlan.calico: Gained IPv6LL Dec 13 03:40:27.417394 env[1140]: time="2024-12-13T03:40:27.416192849Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:27.417394 env[1140]: time="2024-12-13T03:40:27.416405348Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.575 [INFO][4202] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.575 [INFO][4202] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" iface="eth0" netns="/var/run/netns/cni-3541844c-e6b0-20a5-32c0-2b607a2e24d9" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.576 [INFO][4202] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" iface="eth0" netns="/var/run/netns/cni-3541844c-e6b0-20a5-32c0-2b607a2e24d9" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.576 [INFO][4202] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" iface="eth0" netns="/var/run/netns/cni-3541844c-e6b0-20a5-32c0-2b607a2e24d9" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.576 [INFO][4202] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.576 [INFO][4202] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.683 [INFO][4214] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.684 [INFO][4214] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.684 [INFO][4214] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.722 [WARNING][4214] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.722 [INFO][4214] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.725 [INFO][4214] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:27.731669 env[1140]: 2024-12-13 03:40:27.727 [INFO][4202] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:27.735326 systemd[1]: run-netns-cni\x2d3541844c\x2de6b0\x2d20a5\x2d32c0\x2d2b607a2e24d9.mount: Deactivated successfully. Dec 13 03:40:27.737159 env[1140]: time="2024-12-13T03:40:27.737117290Z" level=info msg="TearDown network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" successfully" Dec 13 03:40:27.737269 env[1140]: time="2024-12-13T03:40:27.737248587Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" returns successfully" Dec 13 03:40:27.740652 env[1140]: time="2024-12-13T03:40:27.740554403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9ldmh,Uid:798eee9e-c412-481d-ae46-a472fa8e2ee0,Namespace:kube-system,Attempt:1,}" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.606 [INFO][4203] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.606 [INFO][4203] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" iface="eth0" netns="/var/run/netns/cni-aa561fcd-2f34-efd2-625e-ab4cd7dec65c" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.606 [INFO][4203] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" iface="eth0" netns="/var/run/netns/cni-aa561fcd-2f34-efd2-625e-ab4cd7dec65c" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.607 [INFO][4203] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" iface="eth0" netns="/var/run/netns/cni-aa561fcd-2f34-efd2-625e-ab4cd7dec65c" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.607 [INFO][4203] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.607 [INFO][4203] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.685 [INFO][4219] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.685 [INFO][4219] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.726 [INFO][4219] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.746 [WARNING][4219] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.746 [INFO][4219] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.749 [INFO][4219] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:27.765331 env[1140]: 2024-12-13 03:40:27.752 [INFO][4203] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:27.768868 env[1140]: time="2024-12-13T03:40:27.765366666Z" level=info msg="TearDown network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" successfully" Dec 13 03:40:27.768868 env[1140]: time="2024-12-13T03:40:27.765404306Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" returns successfully" Dec 13 03:40:27.771482 systemd[1]: run-netns-cni\x2daa561fcd\x2d2f34\x2defd2\x2d625e\x2dab4cd7dec65c.mount: Deactivated successfully. Dec 13 03:40:27.773756 env[1140]: time="2024-12-13T03:40:27.773702072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-sv9cc,Uid:2f1d0841-8d75-4c73-a853-4ede410b6584,Namespace:calico-apiserver,Attempt:1,}" Dec 13 03:40:27.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.167:22-172.24.4.1:32918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:27.850019 systemd[1]: Started sshd@11-172.24.4.167:22-172.24.4.1:32918.service. Dec 13 03:40:27.982771 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:40:27.982882 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali893eb220171: link becomes ready Dec 13 03:40:27.982417 systemd-networkd[979]: cali893eb220171: Link UP Dec 13 03:40:27.982618 systemd-networkd[979]: cali893eb220171: Gained carrier Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.833 [INFO][4226] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0 coredns-76f75df574- kube-system 798eee9e-c412-481d-ae46-a472fa8e2ee0 990 0 2024-12-13 03:39:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal coredns-76f75df574-9ldmh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali893eb220171 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.833 [INFO][4226] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.913 [INFO][4249] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" HandleID="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.924 [INFO][4249] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" HandleID="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000284440), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"coredns-76f75df574-9ldmh", "timestamp":"2024-12-13 03:40:27.913172535 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.925 [INFO][4249] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.925 [INFO][4249] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.925 [INFO][4249] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.928 [INFO][4249] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.937 [INFO][4249] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.949 [INFO][4249] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.950 [INFO][4249] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.952 [INFO][4249] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.952 [INFO][4249] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.954 [INFO][4249] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.960 [INFO][4249] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.968 [INFO][4249] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.1/26] block=192.168.124.0/26 handle="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.969 [INFO][4249] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.1/26] handle="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.969 [INFO][4249] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:28.157562 env[1140]: 2024-12-13 03:40:27.969 [INFO][4249] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.1/26] IPv6=[] ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" HandleID="k8s-pod-network.c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:27.971 [INFO][4226] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"798eee9e-c412-481d-ae46-a472fa8e2ee0", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"coredns-76f75df574-9ldmh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali893eb220171", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:27.972 [INFO][4226] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.1/32] ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:27.972 [INFO][4226] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali893eb220171 ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:27.985 [INFO][4226] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:27.985 [INFO][4226] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"798eee9e-c412-481d-ae46-a472fa8e2ee0", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b", Pod:"coredns-76f75df574-9ldmh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali893eb220171", MAC:"8e:0c:da:3d:01:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:28.159095 env[1140]: 2024-12-13 03:40:28.154 [INFO][4226] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b" Namespace="kube-system" Pod="coredns-76f75df574-9ldmh" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:28.307547 env[1140]: time="2024-12-13T03:40:28.307103196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:28.310256 env[1140]: time="2024-12-13T03:40:28.307353627Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:28.310256 env[1140]: time="2024-12-13T03:40:28.307919789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:28.311125 env[1140]: time="2024-12-13T03:40:28.310705188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b pid=4286 runtime=io.containerd.runc.v2 Dec 13 03:40:28.419066 env[1140]: time="2024-12-13T03:40:28.418944095Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:28.473759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d81b70d112: link becomes ready Dec 13 03:40:28.474938 systemd-networkd[979]: cali2d81b70d112: Link UP Dec 13 03:40:28.479068 systemd-networkd[979]: cali2d81b70d112: Gained carrier Dec 13 03:40:28.508088 systemd[1]: Started cri-containerd-c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b.scope. Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.527000 audit: BPF prog-id=177 op=LOAD Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396539326162663861623435366462333334636639343437616134 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396539326162663861623435366462333334636639343437616134 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit: BPF prog-id=178 op=LOAD Dec 13 03:40:28.529000 audit[4310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f9d90 items=0 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396539326162663861623435366462333334636639343437616134 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit: BPF prog-id=179 op=LOAD Dec 13 03:40:28.529000 audit[4310]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f9dd8 items=0 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396539326162663861623435366462333334636639343437616134 Dec 13 03:40:28.529000 audit: BPF prog-id=179 op=UNLOAD Dec 13 03:40:28.529000 audit: BPF prog-id=178 op=UNLOAD Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { perfmon } for pid=4310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit[4310]: AVC avc: denied { bpf } for pid=4310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.529000 audit: BPF prog-id=180 op=LOAD Dec 13 03:40:28.529000 audit[4310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ec1e8 items=0 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330396539326162663861623435366462333334636639343437616134 Dec 13 03:40:28.561798 env[1140]: time="2024-12-13T03:40:28.561759683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9ldmh,Uid:798eee9e-c412-481d-ae46-a472fa8e2ee0,Namespace:kube-system,Attempt:1,} returns sandbox id \"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b\"" Dec 13 03:40:28.641000 audit[4342]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:28.641000 audit[4342]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd6f700270 a2=0 a3=7ffd6f70025c items=0 ppid=3971 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:28.665831 env[1140]: time="2024-12-13T03:40:28.665796184Z" level=info msg="CreateContainer within sandbox \"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.875 [INFO][4235] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0 calico-apiserver-5d67d6dbcf- calico-apiserver 2f1d0841-8d75-4c73-a853-4ede410b6584 991 0 2024-12-13 03:39:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d67d6dbcf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal calico-apiserver-5d67d6dbcf-sv9cc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2d81b70d112 [] []}} ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.875 [INFO][4235] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.931 [INFO][4258] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" HandleID="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.948 [INFO][4258] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" HandleID="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310d60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"calico-apiserver-5d67d6dbcf-sv9cc", "timestamp":"2024-12-13 03:40:27.93117115 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.948 [INFO][4258] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.971 [INFO][4258] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.972 [INFO][4258] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:27.986 [INFO][4258] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.037 [INFO][4258] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.160 [INFO][4258] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.163 [INFO][4258] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.243 [INFO][4258] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.243 [INFO][4258] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.246 [INFO][4258] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14 Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.359 [INFO][4258] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.458 [INFO][4258] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.2/26] block=192.168.124.0/26 handle="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.458 [INFO][4258] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.2/26] handle="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.459 [INFO][4258] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:28.713081 env[1140]: 2024-12-13 03:40:28.459 [INFO][4258] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.2/26] IPv6=[] ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" HandleID="k8s-pod-network.53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.464 [INFO][4235] cni-plugin/k8s.go 386: Populated endpoint ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f1d0841-8d75-4c73-a853-4ede410b6584", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"calico-apiserver-5d67d6dbcf-sv9cc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d81b70d112", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.464 [INFO][4235] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.2/32] ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.464 [INFO][4235] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d81b70d112 ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.482 [INFO][4235] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.483 [INFO][4235] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f1d0841-8d75-4c73-a853-4ede410b6584", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14", Pod:"calico-apiserver-5d67d6dbcf-sv9cc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d81b70d112", MAC:"fe:9e:a6:ff:69:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:28.715114 env[1140]: 2024-12-13 03:40:28.705 [INFO][4235] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-sv9cc" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:28.733000 audit[4353]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:28.733000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffd9cfcbcf0 a2=0 a3=7ffd9cfcbcdc items=0 ppid=3971 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:28.753709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2973951369.mount: Deactivated successfully. Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.742 [INFO][4311] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.742 [INFO][4311] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" iface="eth0" netns="/var/run/netns/cni-2524c0b9-db16-418f-6e98-0ce3fa22b615" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.748 [INFO][4311] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" iface="eth0" netns="/var/run/netns/cni-2524c0b9-db16-418f-6e98-0ce3fa22b615" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.748 [INFO][4311] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" iface="eth0" netns="/var/run/netns/cni-2524c0b9-db16-418f-6e98-0ce3fa22b615" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.749 [INFO][4311] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.749 [INFO][4311] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.776 [INFO][4358] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.776 [INFO][4358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.776 [INFO][4358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.789 [WARNING][4358] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.789 [INFO][4358] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.791 [INFO][4358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:28.797063 env[1140]: 2024-12-13 03:40:28.795 [INFO][4311] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:28.800429 env[1140]: time="2024-12-13T03:40:28.800374320Z" level=info msg="TearDown network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" successfully" Dec 13 03:40:28.800547 env[1140]: time="2024-12-13T03:40:28.800525835Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" returns successfully" Dec 13 03:40:28.801232 systemd[1]: run-netns-cni\x2d2524c0b9\x2ddb16\x2d418f\x2d6e98\x2d0ce3fa22b615.mount: Deactivated successfully. Dec 13 03:40:28.805674 env[1140]: time="2024-12-13T03:40:28.805590792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9vdvk,Uid:0511a489-3ef6-4634-bda9-6280d50164d6,Namespace:calico-system,Attempt:1,}" Dec 13 03:40:28.814957 env[1140]: time="2024-12-13T03:40:28.812540537Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:28.814957 env[1140]: time="2024-12-13T03:40:28.812684858Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:28.814957 env[1140]: time="2024-12-13T03:40:28.812772352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:28.814957 env[1140]: time="2024-12-13T03:40:28.813186328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14 pid=4372 runtime=io.containerd.runc.v2 Dec 13 03:40:28.824663 env[1140]: time="2024-12-13T03:40:28.824587068Z" level=info msg="CreateContainer within sandbox \"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bc9646292c8290bf51e9bd8e14eab4e810da5458d6ce5f55b6953909099bbd73\"" Dec 13 03:40:28.827689 env[1140]: time="2024-12-13T03:40:28.827054320Z" level=info msg="StartContainer for \"bc9646292c8290bf51e9bd8e14eab4e810da5458d6ce5f55b6953909099bbd73\"" Dec 13 03:40:28.843474 systemd[1]: Started cri-containerd-53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14.scope. Dec 13 03:40:28.861367 systemd[1]: Started cri-containerd-bc9646292c8290bf51e9bd8e14eab4e810da5458d6ce5f55b6953909099bbd73.scope. Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.889000 audit: BPF prog-id=181 op=LOAD Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4372 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533616534346331336433373461326539356231613664626638313064 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4372 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533616534346331336433373461326539356231613664626638313064 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit: BPF prog-id=182 op=LOAD Dec 13 03:40:28.890000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002d3ce0 items=0 ppid=4372 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533616534346331336433373461326539356231613664626638313064 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.890000 audit: BPF prog-id=183 op=LOAD Dec 13 03:40:28.890000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002d3d28 items=0 ppid=4372 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533616534346331336433373461326539356231613664626638313064 Dec 13 03:40:28.891000 audit: BPF prog-id=183 op=UNLOAD Dec 13 03:40:28.891000 audit: BPF prog-id=182 op=UNLOAD Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.891000 audit: BPF prog-id=184 op=LOAD Dec 13 03:40:28.891000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035a138 items=0 ppid=4372 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533616534346331336433373461326539356231613664626638313064 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.924000 audit: BPF prog-id=185 op=LOAD Dec 13 03:40:28.925000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.925000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4286 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393634363239326338323930626635316539626438653134656162 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=4286 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393634363239326338323930626635316539626438653134656162 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.926000 audit: BPF prog-id=186 op=LOAD Dec 13 03:40:28.926000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000219ff0 items=0 ppid=4286 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393634363239326338323930626635316539626438653134656162 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.930000 audit: BPF prog-id=187 op=LOAD Dec 13 03:40:28.930000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000418038 items=0 ppid=4286 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393634363239326338323930626635316539626438653134656162 Dec 13 03:40:28.934000 audit: BPF prog-id=187 op=UNLOAD Dec 13 03:40:28.934000 audit: BPF prog-id=186 op=UNLOAD Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:28.934000 audit: BPF prog-id=188 op=LOAD Dec 13 03:40:28.934000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000418448 items=0 ppid=4286 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:28.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263393634363239326338323930626635316539626438653134656162 Dec 13 03:40:28.964511 env[1140]: time="2024-12-13T03:40:28.964461176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-sv9cc,Uid:2f1d0841-8d75-4c73-a853-4ede410b6584,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14\"" Dec 13 03:40:28.969573 env[1140]: time="2024-12-13T03:40:28.969387844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 03:40:29.000104 env[1140]: time="2024-12-13T03:40:29.000048535Z" level=info msg="StartContainer for \"bc9646292c8290bf51e9bd8e14eab4e810da5458d6ce5f55b6953909099bbd73\" returns successfully" Dec 13 03:40:29.063927 kernel: kauditd_printk_skb: 689 callbacks suppressed Dec 13 03:40:29.064086 kernel: audit: type=1101 audit(1734061229.057:1160): pid=4250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.057000 audit[4250]: USER_ACCT pid=4250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.064226 sshd[4250]: Accepted publickey for core from 172.24.4.1 port 32918 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:29.057000 audit[4250]: CRED_ACQ pid=4250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.069454 kernel: audit: type=1103 audit(1734061229.057:1161): pid=4250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.071741 sshd[4250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:29.077025 kernel: audit: type=1006 audit(1734061229.057:1162): pid=4250 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 03:40:29.057000 audit[4250]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4daecce0 a2=3 a3=0 items=0 ppid=1 pid=4250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.086011 kernel: audit: type=1300 audit(1734061229.057:1162): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4daecce0 a2=3 a3=0 items=0 ppid=1 pid=4250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.086114 kernel: audit: type=1327 audit(1734061229.057:1162): proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:29.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:29.088546 systemd[1]: Started session-12.scope. Dec 13 03:40:29.088845 systemd-logind[1133]: New session 12 of user core. Dec 13 03:40:29.097000 audit[4250]: USER_START pid=4250 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.104066 kernel: audit: type=1105 audit(1734061229.097:1163): pid=4250 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.104139 kernel: audit: type=1103 audit(1734061229.098:1164): pid=4457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.098000 audit[4457]: CRED_ACQ pid=4457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:29.151025 systemd-networkd[979]: cali872c0737a0e: Link UP Dec 13 03:40:29.156189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:40:29.156238 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali872c0737a0e: link becomes ready Dec 13 03:40:29.156403 systemd-networkd[979]: cali872c0737a0e: Gained carrier Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:28.965 [INFO][4416] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0 csi-node-driver- calico-system 0511a489-3ef6-4634-bda9-6280d50164d6 1002 0 2024-12-13 03:39:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal csi-node-driver-9vdvk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali872c0737a0e [] []}} ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:28.965 [INFO][4416] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.028 [INFO][4448] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" HandleID="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.040 [INFO][4448] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" HandleID="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003187f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"csi-node-driver-9vdvk", "timestamp":"2024-12-13 03:40:29.028012583 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.041 [INFO][4448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.041 [INFO][4448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.041 [INFO][4448] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.043 [INFO][4448] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.050 [INFO][4448] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.088 [INFO][4448] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.092 [INFO][4448] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.098 [INFO][4448] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.098 [INFO][4448] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.110 [INFO][4448] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93 Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.130 [INFO][4448] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.136 [INFO][4448] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.3/26] block=192.168.124.0/26 handle="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.136 [INFO][4448] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.3/26] handle="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.136 [INFO][4448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:29.173582 env[1140]: 2024-12-13 03:40:29.136 [INFO][4448] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.3/26] IPv6=[] ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" HandleID="k8s-pod-network.ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.138 [INFO][4416] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0511a489-3ef6-4634-bda9-6280d50164d6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"csi-node-driver-9vdvk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali872c0737a0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.138 [INFO][4416] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.3/32] ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.138 [INFO][4416] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali872c0737a0e ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.156 [INFO][4416] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.156 [INFO][4416] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0511a489-3ef6-4634-bda9-6280d50164d6", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93", Pod:"csi-node-driver-9vdvk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali872c0737a0e", MAC:"66:83:be:7a:fa:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:29.174516 env[1140]: 2024-12-13 03:40:29.171 [INFO][4416] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93" Namespace="calico-system" Pod="csi-node-driver-9vdvk" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:29.175136 kubelet[2019]: I1213 03:40:29.175096 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-9ldmh" podStartSLOduration=86.175050855 podStartE2EDuration="1m26.175050855s" podCreationTimestamp="2024-12-13 03:39:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:40:29.034289195 +0000 UTC m=+96.810178426" watchObservedRunningTime="2024-12-13 03:40:29.175050855 +0000 UTC m=+96.950940076" Dec 13 03:40:29.182000 audit[4461]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:29.182000 audit[4461]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc0bdce580 a2=0 a3=7ffc0bdce56c items=0 ppid=2156 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.192122 kernel: audit: type=1325 audit(1734061229.182:1165): table=filter:103 family=2 entries=16 op=nft_register_rule pid=4461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:29.192204 kernel: audit: type=1300 audit(1734061229.182:1165): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc0bdce580 a2=0 a3=7ffc0bdce56c items=0 ppid=2156 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:29.195271 kernel: audit: type=1327 audit(1734061229.182:1165): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:29.191000 audit[4461]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:29.191000 audit[4461]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc0bdce580 a2=0 a3=0 items=0 ppid=2156 pid=4461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:29.199357 env[1140]: time="2024-12-13T03:40:29.199276367Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:29.199357 env[1140]: time="2024-12-13T03:40:29.199326621Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:29.199508 env[1140]: time="2024-12-13T03:40:29.199350296Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:29.199605 env[1140]: time="2024-12-13T03:40:29.199574105Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93 pid=4477 runtime=io.containerd.runc.v2 Dec 13 03:40:29.217541 systemd[1]: Started cri-containerd-ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93.scope. Dec 13 03:40:29.227000 audit[4497]: NETFILTER_CFG table=filter:105 family=2 entries=48 op=nft_register_chain pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:29.227000 audit[4497]: SYSCALL arch=c000003e syscall=46 success=yes exit=24376 a0=3 a1=7ffefd0e49c0 a2=0 a3=7ffefd0e49ac items=0 ppid=3971 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:29.242075 systemd-networkd[979]: cali893eb220171: Gained IPv6LL Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.253000 audit: BPF prog-id=189 op=LOAD Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4477 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353138373637393534313232303462356665316364643462353837 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4477 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353138373637393534313232303462356665316364643462353837 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit: BPF prog-id=190 op=LOAD Dec 13 03:40:29.254000 audit[4488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024550 items=0 ppid=4477 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353138373637393534313232303462356665316364643462353837 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit: BPF prog-id=191 op=LOAD Dec 13 03:40:29.254000 audit[4488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024598 items=0 ppid=4477 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353138373637393534313232303462356665316364643462353837 Dec 13 03:40:29.254000 audit: BPF prog-id=191 op=UNLOAD Dec 13 03:40:29.254000 audit: BPF prog-id=190 op=UNLOAD Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { perfmon } for pid=4488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit[4488]: AVC avc: denied { bpf } for pid=4488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:29.254000 audit: BPF prog-id=192 op=LOAD Dec 13 03:40:29.254000 audit[4488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000249a8 items=0 ppid=4477 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:29.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666353138373637393534313232303462356665316364643462353837 Dec 13 03:40:29.278646 env[1140]: time="2024-12-13T03:40:29.278597783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9vdvk,Uid:0511a489-3ef6-4634-bda9-6280d50164d6,Namespace:calico-system,Attempt:1,} returns sandbox id \"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93\"" Dec 13 03:40:29.816036 systemd-networkd[979]: cali2d81b70d112: Gained IPv6LL Dec 13 03:40:30.160000 audit[4530]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:30.160000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcd82af3e0 a2=0 a3=7ffcd82af3cc items=0 ppid=2156 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:30.165000 audit[4530]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:30.165000 audit[4530]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcd82af3e0 a2=0 a3=7ffcd82af3cc items=0 ppid=2156 pid=4530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:30.418235 env[1140]: time="2024-12-13T03:40:30.416707644Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:30.417854 sshd[4250]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:30.421000 audit[4250]: USER_END pid=4250 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:30.421000 audit[4250]: CRED_DISP pid=4250 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:30.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.167:22-172.24.4.1:32918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:30.424743 systemd[1]: sshd@11-172.24.4.167:22-172.24.4.1:32918.service: Deactivated successfully. Dec 13 03:40:30.425910 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 03:40:30.429048 systemd-logind[1133]: Session 12 logged out. Waiting for processes to exit. Dec 13 03:40:30.431068 systemd-logind[1133]: Removed session 12. Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.518 [INFO][4547] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.518 [INFO][4547] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" iface="eth0" netns="/var/run/netns/cni-c69e872f-4c3b-e4e9-bf9b-292a1770347c" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.519 [INFO][4547] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" iface="eth0" netns="/var/run/netns/cni-c69e872f-4c3b-e4e9-bf9b-292a1770347c" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.519 [INFO][4547] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" iface="eth0" netns="/var/run/netns/cni-c69e872f-4c3b-e4e9-bf9b-292a1770347c" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.519 [INFO][4547] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.519 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.566 [INFO][4553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.566 [INFO][4553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.566 [INFO][4553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.581 [WARNING][4553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.581 [INFO][4553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.583 [INFO][4553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:30.589096 env[1140]: 2024-12-13 03:40:30.585 [INFO][4547] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:30.591082 env[1140]: time="2024-12-13T03:40:30.590970623Z" level=info msg="TearDown network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" successfully" Dec 13 03:40:30.591304 env[1140]: time="2024-12-13T03:40:30.591254937Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" returns successfully" Dec 13 03:40:30.599032 env[1140]: time="2024-12-13T03:40:30.594269505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jdwm9,Uid:ee472d7b-bab8-4369-b29f-b404b9bc9acc,Namespace:kube-system,Attempt:1,}" Dec 13 03:40:30.600853 systemd[1]: run-netns-cni\x2dc69e872f\x2d4c3b\x2de4e9\x2dbf9b\x2d292a1770347c.mount: Deactivated successfully. Dec 13 03:40:30.810552 systemd-networkd[979]: cali203a7bd5755: Link UP Dec 13 03:40:30.816660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:40:30.816734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali203a7bd5755: link becomes ready Dec 13 03:40:30.817635 systemd-networkd[979]: cali203a7bd5755: Gained carrier Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.692 [INFO][4560] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0 coredns-76f75df574- kube-system ee472d7b-bab8-4369-b29f-b404b9bc9acc 1024 0 2024-12-13 03:39:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal coredns-76f75df574-jdwm9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali203a7bd5755 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.692 [INFO][4560] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.747 [INFO][4573] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" HandleID="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.760 [INFO][4573] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" HandleID="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000126da0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"coredns-76f75df574-jdwm9", "timestamp":"2024-12-13 03:40:30.747298318 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.760 [INFO][4573] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.760 [INFO][4573] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.761 [INFO][4573] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.766 [INFO][4573] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.772 [INFO][4573] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.776 [INFO][4573] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.778 [INFO][4573] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.781 [INFO][4573] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.781 [INFO][4573] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.782 [INFO][4573] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3 Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.788 [INFO][4573] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.799 [INFO][4573] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.4/26] block=192.168.124.0/26 handle="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.799 [INFO][4573] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.4/26] handle="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.799 [INFO][4573] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:30.835085 env[1140]: 2024-12-13 03:40:30.799 [INFO][4573] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.4/26] IPv6=[] ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" HandleID="k8s-pod-network.effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.801 [INFO][4560] cni-plugin/k8s.go 386: Populated endpoint ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ee472d7b-bab8-4369-b29f-b404b9bc9acc", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"coredns-76f75df574-jdwm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali203a7bd5755", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.802 [INFO][4560] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.4/32] ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.802 [INFO][4560] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali203a7bd5755 ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.818 [INFO][4560] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.819 [INFO][4560] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ee472d7b-bab8-4369-b29f-b404b9bc9acc", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3", Pod:"coredns-76f75df574-jdwm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali203a7bd5755", MAC:"ce:0d:1b:e7:ac:05", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:30.835806 env[1140]: 2024-12-13 03:40:30.831 [INFO][4560] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3" Namespace="kube-system" Pod="coredns-76f75df574-jdwm9" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:30.888752 env[1140]: time="2024-12-13T03:40:30.888678578Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:30.888931 env[1140]: time="2024-12-13T03:40:30.888726117Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:30.888931 env[1140]: time="2024-12-13T03:40:30.888740985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:30.889071 env[1140]: time="2024-12-13T03:40:30.888969313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3 pid=4600 runtime=io.containerd.runc.v2 Dec 13 03:40:30.900000 audit[4588]: NETFILTER_CFG table=filter:108 family=2 entries=40 op=nft_register_chain pid=4588 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:30.900000 audit[4588]: SYSCALL arch=c000003e syscall=46 success=yes exit=21056 a0=3 a1=7ffdc7982d30 a2=0 a3=7ffdc7982d1c items=0 ppid=3971 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.900000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:30.925705 systemd[1]: Started cri-containerd-effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3.scope. Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.955000 audit: BPF prog-id=193 op=LOAD Dec 13 03:40:30.957000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.957000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4600 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566666232323763353833363433313535363334333332333831636235 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4600 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566666232323763353833363433313535363334333332333831636235 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit: BPF prog-id=194 op=LOAD Dec 13 03:40:30.958000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003095c0 items=0 ppid=4600 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566666232323763353833363433313535363334333332333831636235 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit: BPF prog-id=195 op=LOAD Dec 13 03:40:30.958000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000309608 items=0 ppid=4600 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566666232323763353833363433313535363334333332333831636235 Dec 13 03:40:30.958000 audit: BPF prog-id=195 op=UNLOAD Dec 13 03:40:30.958000 audit: BPF prog-id=194 op=UNLOAD Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:30.958000 audit: BPF prog-id=196 op=LOAD Dec 13 03:40:30.958000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000309a18 items=0 ppid=4600 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:30.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566666232323763353833363433313535363334333332333831636235 Dec 13 03:40:30.966173 systemd-networkd[979]: cali872c0737a0e: Gained IPv6LL Dec 13 03:40:31.026345 env[1140]: time="2024-12-13T03:40:31.026298287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-jdwm9,Uid:ee472d7b-bab8-4369-b29f-b404b9bc9acc,Namespace:kube-system,Attempt:1,} returns sandbox id \"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3\"" Dec 13 03:40:31.094523 env[1140]: time="2024-12-13T03:40:31.094424508Z" level=info msg="CreateContainer within sandbox \"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 03:40:31.350769 env[1140]: time="2024-12-13T03:40:31.350603476Z" level=info msg="CreateContainer within sandbox \"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a23c660ef02fda10e7b2f81aff57812ae87a6a9e14196236c300b4fb1f6a968\"" Dec 13 03:40:31.353497 env[1140]: time="2024-12-13T03:40:31.353460960Z" level=info msg="StartContainer for \"8a23c660ef02fda10e7b2f81aff57812ae87a6a9e14196236c300b4fb1f6a968\"" Dec 13 03:40:31.389308 systemd[1]: Started cri-containerd-8a23c660ef02fda10e7b2f81aff57812ae87a6a9e14196236c300b4fb1f6a968.scope. Dec 13 03:40:31.415550 env[1140]: time="2024-12-13T03:40:31.415509433Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.444000 audit: BPF prog-id=197 op=LOAD Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4600 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:31.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323363363630656630326664613130653762326638316166663537 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4600 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:31.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323363363630656630326664613130653762326638316166663537 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit: BPF prog-id=198 op=LOAD Dec 13 03:40:31.446000 audit[4642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000295120 items=0 ppid=4600 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:31.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323363363630656630326664613130653762326638316166663537 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit: BPF prog-id=199 op=LOAD Dec 13 03:40:31.446000 audit[4642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000295168 items=0 ppid=4600 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:31.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323363363630656630326664613130653762326638316166663537 Dec 13 03:40:31.446000 audit: BPF prog-id=199 op=UNLOAD Dec 13 03:40:31.446000 audit: BPF prog-id=198 op=UNLOAD Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { perfmon } for pid=4642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit[4642]: AVC avc: denied { bpf } for pid=4642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:31.446000 audit: BPF prog-id=200 op=LOAD Dec 13 03:40:31.446000 audit[4642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000295578 items=0 ppid=4600 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:31.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323363363630656630326664613130653762326638316166663537 Dec 13 03:40:31.547755 env[1140]: time="2024-12-13T03:40:31.547685243Z" level=info msg="StartContainer for \"8a23c660ef02fda10e7b2f81aff57812ae87a6a9e14196236c300b4fb1f6a968\" returns successfully" Dec 13 03:40:31.926326 systemd-networkd[979]: cali203a7bd5755: Gained IPv6LL Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.550 [INFO][4677] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.550 [INFO][4677] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" iface="eth0" netns="/var/run/netns/cni-806562d9-11fc-488b-70ae-b4e5021e20f7" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.550 [INFO][4677] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" iface="eth0" netns="/var/run/netns/cni-806562d9-11fc-488b-70ae-b4e5021e20f7" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.552 [INFO][4677] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" iface="eth0" netns="/var/run/netns/cni-806562d9-11fc-488b-70ae-b4e5021e20f7" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.552 [INFO][4677] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.552 [INFO][4677] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.637 [INFO][4689] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.637 [INFO][4689] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.637 [INFO][4689] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.939 [WARNING][4689] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.940 [INFO][4689] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.944 [INFO][4689] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:31.952757 env[1140]: 2024-12-13 03:40:31.948 [INFO][4677] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:31.961560 systemd[1]: run-netns-cni\x2d806562d9\x2d11fc\x2d488b\x2d70ae\x2db4e5021e20f7.mount: Deactivated successfully. Dec 13 03:40:31.965787 env[1140]: time="2024-12-13T03:40:31.965694492Z" level=info msg="TearDown network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" successfully" Dec 13 03:40:31.966193 env[1140]: time="2024-12-13T03:40:31.965952336Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" returns successfully" Dec 13 03:40:31.968800 env[1140]: time="2024-12-13T03:40:31.968740730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-746c895955-cdbs4,Uid:ae02de06-006f-4364-afd7-4f696b4572fa,Namespace:calico-system,Attempt:1,}" Dec 13 03:40:32.191000 audit[4699]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:32.191000 audit[4699]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff6cde6970 a2=0 a3=7fff6cde695c items=0 ppid=2156 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:32.216046 kubelet[2019]: I1213 03:40:32.215474 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-jdwm9" podStartSLOduration=89.215354762 podStartE2EDuration="1m29.215354762s" podCreationTimestamp="2024-12-13 03:39:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:40:32.137212634 +0000 UTC m=+99.913101915" watchObservedRunningTime="2024-12-13 03:40:32.215354762 +0000 UTC m=+99.991244033" Dec 13 03:40:32.202000 audit[4699]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:32.202000 audit[4699]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff6cde6970 a2=0 a3=7fff6cde695c items=0 ppid=2156 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:32.355000 audit[4713]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:32.355000 audit[4713]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff43b54910 a2=0 a3=7fff43b548fc items=0 ppid=2156 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:32.391000 audit[4713]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:32.391000 audit[4713]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff43b54910 a2=0 a3=7fff43b548fc items=0 ppid=2156 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:32.418409 env[1140]: time="2024-12-13T03:40:32.418334574Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:32.464911 systemd-networkd[979]: cali638c6061040: Link UP Dec 13 03:40:32.473217 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:40:32.473577 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali638c6061040: link becomes ready Dec 13 03:40:32.473730 systemd-networkd[979]: cali638c6061040: Gained carrier Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.313 [INFO][4700] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0 calico-kube-controllers-746c895955- calico-system ae02de06-006f-4364-afd7-4f696b4572fa 1034 0 2024-12-13 03:39:15 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:746c895955 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal calico-kube-controllers-746c895955-cdbs4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali638c6061040 [] []}} ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.313 [INFO][4700] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.352 [INFO][4714] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" HandleID="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.372 [INFO][4714] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" HandleID="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"calico-kube-controllers-746c895955-cdbs4", "timestamp":"2024-12-13 03:40:32.352965911 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.373 [INFO][4714] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.373 [INFO][4714] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.373 [INFO][4714] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.376 [INFO][4714] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.397 [INFO][4714] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.409 [INFO][4714] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.419 [INFO][4714] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.428 [INFO][4714] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.428 [INFO][4714] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.431 [INFO][4714] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45 Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.442 [INFO][4714] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.453 [INFO][4714] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.5/26] block=192.168.124.0/26 handle="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.453 [INFO][4714] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.5/26] handle="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.453 [INFO][4714] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:32.540424 env[1140]: 2024-12-13 03:40:32.453 [INFO][4714] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.5/26] IPv6=[] ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" HandleID="k8s-pod-network.9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.456 [INFO][4700] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0", GenerateName:"calico-kube-controllers-746c895955-", Namespace:"calico-system", SelfLink:"", UID:"ae02de06-006f-4364-afd7-4f696b4572fa", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"746c895955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"calico-kube-controllers-746c895955-cdbs4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.124.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali638c6061040", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.456 [INFO][4700] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.5/32] ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.456 [INFO][4700] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali638c6061040 ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.474 [INFO][4700] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.474 [INFO][4700] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0", GenerateName:"calico-kube-controllers-746c895955-", Namespace:"calico-system", SelfLink:"", UID:"ae02de06-006f-4364-afd7-4f696b4572fa", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"746c895955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45", Pod:"calico-kube-controllers-746c895955-cdbs4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.124.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali638c6061040", MAC:"7a:4a:5c:6f:bc:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:32.541731 env[1140]: 2024-12-13 03:40:32.537 [INFO][4700] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45" Namespace="calico-system" Pod="calico-kube-controllers-746c895955-cdbs4" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:32.602000 audit[4757]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:32.602000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=19796 a0=3 a1=7ffcb76c3800 a2=0 a3=7ffcb76c37ec items=0 ppid=3971 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.602000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:32.630122 env[1140]: time="2024-12-13T03:40:32.630044002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:32.630687 env[1140]: time="2024-12-13T03:40:32.630658675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:32.630802 env[1140]: time="2024-12-13T03:40:32.630777860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:32.631090 env[1140]: time="2024-12-13T03:40:32.631029692Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45 pid=4767 runtime=io.containerd.runc.v2 Dec 13 03:40:32.665348 systemd[1]: Started cri-containerd-9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45.scope. Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.725000 audit: BPF prog-id=201 op=LOAD Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4767 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343939393864663263303434333432613338653862653237613366 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4767 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343939393864663263303434333432613338653862653237613366 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.728000 audit: BPF prog-id=202 op=LOAD Dec 13 03:40:32.728000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003e8670 items=0 ppid=4767 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343939393864663263303434333432613338653862653237613366 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.729000 audit: BPF prog-id=203 op=LOAD Dec 13 03:40:32.729000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003e86b8 items=0 ppid=4767 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343939393864663263303434333432613338653862653237613366 Dec 13 03:40:32.730000 audit: BPF prog-id=203 op=UNLOAD Dec 13 03:40:32.730000 audit: BPF prog-id=202 op=UNLOAD Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:32.730000 audit: BPF prog-id=204 op=LOAD Dec 13 03:40:32.730000 audit[4779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003e8ac8 items=0 ppid=4767 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:32.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343939393864663263303434333432613338653862653237613366 Dec 13 03:40:33.146908 env[1140]: time="2024-12-13T03:40:32.773823578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-746c895955-cdbs4,Uid:ae02de06-006f-4364-afd7-4f696b4572fa,Namespace:calico-system,Attempt:1,} returns sandbox id \"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45\"" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.577 [INFO][4740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.577 [INFO][4740] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" iface="eth0" netns="/var/run/netns/cni-aa2030a0-e889-0cee-b634-10d8e4d38004" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.580 [INFO][4740] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" iface="eth0" netns="/var/run/netns/cni-aa2030a0-e889-0cee-b634-10d8e4d38004" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.581 [INFO][4740] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" iface="eth0" netns="/var/run/netns/cni-aa2030a0-e889-0cee-b634-10d8e4d38004" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.581 [INFO][4740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.581 [INFO][4740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.621 [INFO][4756] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.621 [INFO][4756] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.621 [INFO][4756] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.914 [WARNING][4756] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:32.914 [INFO][4756] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:33.147 [INFO][4756] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:33.157440 env[1140]: 2024-12-13 03:40:33.152 [INFO][4740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:33.179498 env[1140]: time="2024-12-13T03:40:33.160384299Z" level=info msg="TearDown network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" successfully" Dec 13 03:40:33.179498 env[1140]: time="2024-12-13T03:40:33.160422290Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" returns successfully" Dec 13 03:40:33.179498 env[1140]: time="2024-12-13T03:40:33.179487214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-xcg8f,Uid:a0d1c06e-1ad7-45d6-8d62-f5a66cad1314,Namespace:calico-apiserver,Attempt:1,}" Dec 13 03:40:33.166825 systemd[1]: run-netns-cni\x2daa2030a0\x2de889\x2d0cee\x2db634\x2d10d8e4d38004.mount: Deactivated successfully. Dec 13 03:40:34.230712 systemd-networkd[979]: cali638c6061040: Gained IPv6LL Dec 13 03:40:35.389312 env[1140]: time="2024-12-13T03:40:35.389229628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:35.407157 env[1140]: time="2024-12-13T03:40:35.406128706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:35.413341 env[1140]: time="2024-12-13T03:40:35.413276702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:35.418209 env[1140]: time="2024-12-13T03:40:35.418146793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:35.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.167:22-172.24.4.1:38040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:35.421180 systemd[1]: Started sshd@12-172.24.4.167:22-172.24.4.1:38040.service. Dec 13 03:40:35.422807 kernel: kauditd_printk_skb: 261 callbacks suppressed Dec 13 03:40:35.423023 kernel: audit: type=1130 audit(1734061235.420:1251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.167:22-172.24.4.1:38040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:35.429519 env[1140]: time="2024-12-13T03:40:35.419065487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 03:40:35.431254 env[1140]: time="2024-12-13T03:40:35.431190615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 03:40:35.445631 env[1140]: time="2024-12-13T03:40:35.445593157Z" level=info msg="CreateContainer within sandbox \"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 03:40:35.573662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1730714662.mount: Deactivated successfully. Dec 13 03:40:36.423467 env[1140]: time="2024-12-13T03:40:36.422923542Z" level=info msg="CreateContainer within sandbox \"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2d69e6e7ce3d446b97f244e81dc46017c85dbb33852c7deb6cfa73aec443e3d9\"" Dec 13 03:40:36.426038 env[1140]: time="2024-12-13T03:40:36.425469992Z" level=info msg="StartContainer for \"2d69e6e7ce3d446b97f244e81dc46017c85dbb33852c7deb6cfa73aec443e3d9\"" Dec 13 03:40:36.455424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 03:40:36.455634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia34bdaef256: link becomes ready Dec 13 03:40:36.458216 systemd-networkd[979]: calia34bdaef256: Link UP Dec 13 03:40:36.458622 systemd-networkd[979]: calia34bdaef256: Gained carrier Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.453 [INFO][4814] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0 calico-apiserver-5d67d6dbcf- calico-apiserver a0d1c06e-1ad7-45d6-8d62-f5a66cad1314 1053 0 2024-12-13 03:39:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5d67d6dbcf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-5-2a90ac038f.novalocal calico-apiserver-5d67d6dbcf-xcg8f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia34bdaef256 [] []}} ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.454 [INFO][4814] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.502 [INFO][4831] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" HandleID="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.747 [INFO][4831] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" HandleID="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308b70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-5-2a90ac038f.novalocal", "pod":"calico-apiserver-5d67d6dbcf-xcg8f", "timestamp":"2024-12-13 03:40:35.502549789 +0000 UTC"}, Hostname:"ci-3510-3-6-5-2a90ac038f.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.747 [INFO][4831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.747 [INFO][4831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.747 [INFO][4831] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-5-2a90ac038f.novalocal' Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.749 [INFO][4831] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.790 [INFO][4831] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.799 [INFO][4831] ipam/ipam.go 489: Trying affinity for 192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.804 [INFO][4831] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.845 [INFO][4831] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.0/26 host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.846 [INFO][4831] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.0/26 handle="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.865 [INFO][4831] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74 Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:35.954 [INFO][4831] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.0/26 handle="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:36.431 [INFO][4831] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.6/26] block=192.168.124.0/26 handle="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:36.431 [INFO][4831] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.6/26] handle="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" host="ci-3510-3-6-5-2a90ac038f.novalocal" Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:36.431 [INFO][4831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:36.537423 env[1140]: 2024-12-13 03:40:36.431 [INFO][4831] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.6/26] IPv6=[] ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" HandleID="k8s-pod-network.e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.444 [INFO][4814] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"", Pod:"calico-apiserver-5d67d6dbcf-xcg8f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia34bdaef256", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.444 [INFO][4814] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.6/32] ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.444 [INFO][4814] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia34bdaef256 ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.456 [INFO][4814] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.457 [INFO][4814] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74", Pod:"calico-apiserver-5d67d6dbcf-xcg8f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia34bdaef256", MAC:"be:c6:89:30:40:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:36.540927 env[1140]: 2024-12-13 03:40:36.511 [INFO][4814] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74" Namespace="calico-apiserver" Pod="calico-apiserver-5d67d6dbcf-xcg8f" WorkloadEndpoint="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:36.563392 systemd[1]: run-containerd-runc-k8s.io-2d69e6e7ce3d446b97f244e81dc46017c85dbb33852c7deb6cfa73aec443e3d9-runc.nZq6b2.mount: Deactivated successfully. Dec 13 03:40:36.567891 systemd[1]: Started cri-containerd-2d69e6e7ce3d446b97f244e81dc46017c85dbb33852c7deb6cfa73aec443e3d9.scope. Dec 13 03:40:36.578359 kernel: audit: type=1325 audit(1734061236.572:1252): table=filter:114 family=2 entries=42 op=nft_register_chain pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:36.572000 audit[4868]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4868 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 03:40:36.572000 audit[4868]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffef09d6b40 a2=0 a3=7ffef09d6b2c items=0 ppid=3971 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.586465 kernel: audit: type=1300 audit(1734061236.572:1252): arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffef09d6b40 a2=0 a3=7ffef09d6b2c items=0 ppid=3971 pid=4868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.595790 kernel: audit: type=1327 audit(1734061236.572:1252): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:36.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.623090 kernel: audit: type=1400 audit(1734061236.611:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.623191 kernel: audit: type=1400 audit(1734061236.611:1254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.630744 env[1140]: time="2024-12-13T03:40:36.630688020Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 03:40:36.630902 env[1140]: time="2024-12-13T03:40:36.630878398Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 03:40:36.631026 env[1140]: time="2024-12-13T03:40:36.631002901Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 03:40:36.631297 env[1140]: time="2024-12-13T03:40:36.631253040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74 pid=4885 runtime=io.containerd.runc.v2 Dec 13 03:40:36.633900 kernel: audit: type=1400 audit(1734061236.611:1255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.634100 kernel: audit: type=1400 audit(1734061236.611:1256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.640160 kernel: audit: type=1400 audit(1734061236.611:1257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.647193 kernel: audit: type=1400 audit(1734061236.611:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.622000 audit: BPF prog-id=205 op=LOAD Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4372 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363965366537636533643434366239376632343465383164633436 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4372 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363965366537636533643434366239376632343465383164633436 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.633000 audit: BPF prog-id=206 op=LOAD Dec 13 03:40:36.633000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218850 items=0 ppid=4372 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363965366537636533643434366239376632343465383164633436 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit: BPF prog-id=207 op=LOAD Dec 13 03:40:36.635000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218898 items=0 ppid=4372 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363965366537636533643434366239376632343465383164633436 Dec 13 03:40:36.635000 audit: BPF prog-id=207 op=UNLOAD Dec 13 03:40:36.635000 audit: BPF prog-id=206 op=UNLOAD Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { perfmon } for pid=4846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit[4846]: AVC avc: denied { bpf } for pid=4846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.635000 audit: BPF prog-id=208 op=LOAD Dec 13 03:40:36.635000 audit[4846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000218ca8 items=0 ppid=4372 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264363965366537636533643434366239376632343465383164633436 Dec 13 03:40:36.681815 systemd[1]: Started cri-containerd-e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74.scope. Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.703000 audit: BPF prog-id=209 op=LOAD Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4885 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366265353363383364633765386362373832363762326264393061 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4885 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366265353363383364633765386362373832363762326264393061 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.705000 audit: BPF prog-id=210 op=LOAD Dec 13 03:40:36.705000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0004529e0 items=0 ppid=4885 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366265353363383364633765386362373832363762326264393061 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.707000 audit: BPF prog-id=211 op=LOAD Dec 13 03:40:36.707000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000452a28 items=0 ppid=4885 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366265353363383364633765386362373832363762326264393061 Dec 13 03:40:36.707000 audit: BPF prog-id=211 op=UNLOAD Dec 13 03:40:36.707000 audit: BPF prog-id=210 op=UNLOAD Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.708000 audit: BPF prog-id=212 op=LOAD Dec 13 03:40:36.708000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000452e38 items=0 ppid=4885 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531366265353363383364633765386362373832363762326264393061 Dec 13 03:40:36.731633 env[1140]: time="2024-12-13T03:40:36.731385817Z" level=info msg="StartContainer for \"2d69e6e7ce3d446b97f244e81dc46017c85dbb33852c7deb6cfa73aec443e3d9\" returns successfully" Dec 13 03:40:36.751474 env[1140]: time="2024-12-13T03:40:36.751422874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5d67d6dbcf-xcg8f,Uid:a0d1c06e-1ad7-45d6-8d62-f5a66cad1314,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74\"" Dec 13 03:40:36.760258 sshd[4828]: Accepted publickey for core from 172.24.4.1 port 38040 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:36.759000 audit[4828]: USER_ACCT pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:36.762000 audit[4828]: CRED_ACQ pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:36.762000 audit[4828]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb91ce160 a2=3 a3=0 items=0 ppid=1 pid=4828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:36.769631 sshd[4828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:36.771677 env[1140]: time="2024-12-13T03:40:36.771630321Z" level=info msg="CreateContainer within sandbox \"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 03:40:36.780148 systemd[1]: Started session-13.scope. Dec 13 03:40:36.782550 systemd-logind[1133]: New session 13 of user core. Dec 13 03:40:36.787000 audit[4828]: USER_START pid=4828 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:36.789000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:36.823268 env[1140]: time="2024-12-13T03:40:36.823200773Z" level=info msg="CreateContainer within sandbox \"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"46274a3bc5834a3f04f1fe8fbd755f5e337224ac4d3ae973f5787d9f7ff8c862\"" Dec 13 03:40:36.824130 env[1140]: time="2024-12-13T03:40:36.824097125Z" level=info msg="StartContainer for \"46274a3bc5834a3f04f1fe8fbd755f5e337224ac4d3ae973f5787d9f7ff8c862\"" Dec 13 03:40:36.846581 systemd[1]: Started cri-containerd-46274a3bc5834a3f04f1fe8fbd755f5e337224ac4d3ae973f5787d9f7ff8c862.scope. Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.866000 audit: BPF prog-id=213 op=LOAD Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4885 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323734613362633538333461336630346631666538666264373535 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4885 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323734613362633538333461336630346631666538666264373535 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.867000 audit: BPF prog-id=214 op=LOAD Dec 13 03:40:36.867000 audit[4942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0004122a0 items=0 ppid=4885 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323734613362633538333461336630346631666538666264373535 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit: BPF prog-id=215 op=LOAD Dec 13 03:40:36.868000 audit[4942]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0004122e8 items=0 ppid=4885 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323734613362633538333461336630346631666538666264373535 Dec 13 03:40:36.868000 audit: BPF prog-id=215 op=UNLOAD Dec 13 03:40:36.868000 audit: BPF prog-id=214 op=UNLOAD Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { perfmon } for pid=4942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit[4942]: AVC avc: denied { bpf } for pid=4942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:36.868000 audit: BPF prog-id=216 op=LOAD Dec 13 03:40:36.868000 audit[4942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0004126f8 items=0 ppid=4885 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:36.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436323734613362633538333461336630346631666538666264373535 Dec 13 03:40:36.914040 env[1140]: time="2024-12-13T03:40:36.913964455Z" level=info msg="StartContainer for \"46274a3bc5834a3f04f1fe8fbd755f5e337224ac4d3ae973f5787d9f7ff8c862\" returns successfully" Dec 13 03:40:37.114678 kubelet[2019]: I1213 03:40:37.114552 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-sv9cc" podStartSLOduration=75.650599795 podStartE2EDuration="1m22.114494963s" podCreationTimestamp="2024-12-13 03:39:15 +0000 UTC" firstStartedPulling="2024-12-13 03:40:28.966211462 +0000 UTC m=+96.742100683" lastFinishedPulling="2024-12-13 03:40:35.43010663 +0000 UTC m=+103.205995851" observedRunningTime="2024-12-13 03:40:37.112432152 +0000 UTC m=+104.888321373" watchObservedRunningTime="2024-12-13 03:40:37.114494963 +0000 UTC m=+104.890384184" Dec 13 03:40:37.115072 kubelet[2019]: I1213 03:40:37.114692 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5d67d6dbcf-xcg8f" podStartSLOduration=82.114640828 podStartE2EDuration="1m22.114640828s" podCreationTimestamp="2024-12-13 03:39:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 03:40:37.092051681 +0000 UTC m=+104.867940912" watchObservedRunningTime="2024-12-13 03:40:37.114640828 +0000 UTC m=+104.890530069" Dec 13 03:40:37.146000 audit[4971]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:37.146000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff2ac23ec0 a2=0 a3=7fff2ac23eac items=0 ppid=2156 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:37.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:37.151000 audit[4971]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:37.151000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff2ac23ec0 a2=0 a3=7fff2ac23eac items=0 ppid=2156 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:37.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:37.171000 audit[4973]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:37.171000 audit[4973]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff4e4650f0 a2=0 a3=7fff4e4650dc items=0 ppid=2156 pid=4973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:37.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:37.176000 audit[4973]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:37.176000 audit[4973]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff4e4650f0 a2=0 a3=7fff4e4650dc items=0 ppid=2156 pid=4973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:37.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:38.143897 sshd[4828]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:38.148000 audit[4828]: USER_END pid=4828 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:38.148000 audit[4828]: CRED_DISP pid=4828 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:38.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.167:22-172.24.4.1:38050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:38.151294 systemd[1]: Started sshd@13-172.24.4.167:22-172.24.4.1:38050.service. Dec 13 03:40:38.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.167:22-172.24.4.1:38040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:38.151934 systemd[1]: sshd@12-172.24.4.167:22-172.24.4.1:38040.service: Deactivated successfully. Dec 13 03:40:38.154672 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 03:40:38.158861 systemd-logind[1133]: Session 13 logged out. Waiting for processes to exit. Dec 13 03:40:38.163728 systemd-logind[1133]: Removed session 13. Dec 13 03:40:38.262826 systemd-networkd[979]: calia34bdaef256: Gained IPv6LL Dec 13 03:40:38.307568 env[1140]: time="2024-12-13T03:40:38.307528523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:38.310688 env[1140]: time="2024-12-13T03:40:38.310660742Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:38.315261 env[1140]: time="2024-12-13T03:40:38.315229918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:38.319854 env[1140]: time="2024-12-13T03:40:38.319824702Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:38.320735 env[1140]: time="2024-12-13T03:40:38.320710414Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 03:40:38.322006 env[1140]: time="2024-12-13T03:40:38.321877535Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 03:40:38.325921 env[1140]: time="2024-12-13T03:40:38.325885346Z" level=info msg="CreateContainer within sandbox \"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 03:40:38.358667 env[1140]: time="2024-12-13T03:40:38.358625715Z" level=info msg="CreateContainer within sandbox \"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0eb036988986903b14d05342016563532f983e6a07d768af4530ca324eeba0e8\"" Dec 13 03:40:38.359499 env[1140]: time="2024-12-13T03:40:38.359477413Z" level=info msg="StartContainer for \"0eb036988986903b14d05342016563532f983e6a07d768af4530ca324eeba0e8\"" Dec 13 03:40:38.389726 systemd[1]: run-containerd-runc-k8s.io-0eb036988986903b14d05342016563532f983e6a07d768af4530ca324eeba0e8-runc.A5kMAr.mount: Deactivated successfully. Dec 13 03:40:38.405924 systemd[1]: Started cri-containerd-0eb036988986903b14d05342016563532f983e6a07d768af4530ca324eeba0e8.scope. Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9d348f8a88 items=0 ppid=4477 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623033363938383938363930336231346430353334323031363536 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.457000 audit: BPF prog-id=217 op=LOAD Dec 13 03:40:38.457000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000313878 items=0 ppid=4477 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623033363938383938363930336231346430353334323031363536 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit: BPF prog-id=218 op=LOAD Dec 13 03:40:38.458000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003138c8 items=0 ppid=4477 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623033363938383938363930336231346430353334323031363536 Dec 13 03:40:38.458000 audit: BPF prog-id=218 op=UNLOAD Dec 13 03:40:38.458000 audit: BPF prog-id=217 op=UNLOAD Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { perfmon } for pid=4994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit[4994]: AVC avc: denied { bpf } for pid=4994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:38.458000 audit: BPF prog-id=219 op=LOAD Dec 13 03:40:38.458000 audit[4994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000313958 items=0 ppid=4477 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623033363938383938363930336231346430353334323031363536 Dec 13 03:40:38.497000 audit[4873]: AVC avc: denied { watch } for pid=4873 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_39_36.3862089968/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c378,c996 tclass=file permissive=0 Dec 13 03:40:38.497000 audit[4873]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001101c00 a2=fc6 a3=0 items=0 ppid=4372 pid=4873 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 key=(null) Dec 13 03:40:38.497000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:40:38.592030 env[1140]: time="2024-12-13T03:40:38.591956791Z" level=info msg="StartContainer for \"0eb036988986903b14d05342016563532f983e6a07d768af4530ca324eeba0e8\" returns successfully" Dec 13 03:40:38.645000 audit[5021]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:38.645000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9cfce390 a2=0 a3=7fff9cfce37c items=0 ppid=2156 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:38.650000 audit[5021]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:38.650000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff9cfce390 a2=0 a3=7fff9cfce37c items=0 ppid=2156 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:38.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:39.075355 kubelet[2019]: I1213 03:40:39.075297 2019 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 03:40:39.335000 audit[4953]: AVC avc: denied { watch } for pid=4953 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_39_36.2873266221/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c34,c879 tclass=file permissive=0 Dec 13 03:40:39.335000 audit[4953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000625c20 a2=fc6 a3=0 items=0 ppid=4885 pid=4953 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c879 key=(null) Dec 13 03:40:39.335000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:40:39.411000 audit[5023]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:39.411000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe89217090 a2=0 a3=7ffe8921707c items=0 ppid=2156 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:39.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:39.415000 audit[5023]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=5023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:40:39.415000 audit[5023]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe89217090 a2=0 a3=7ffe8921707c items=0 ppid=2156 pid=5023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:39.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:40:39.766000 audit[4985]: USER_ACCT pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:39.767561 sshd[4985]: Accepted publickey for core from 172.24.4.1 port 38050 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:39.771000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:39.771000 audit[4985]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc227cffc0 a2=3 a3=0 items=0 ppid=1 pid=4985 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:39.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:39.774405 sshd[4985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:39.781731 systemd-logind[1133]: New session 14 of user core. Dec 13 03:40:39.784112 systemd[1]: Started session-14.scope. Dec 13 03:40:39.791000 audit[4985]: USER_START pid=4985 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:39.793000 audit[5024]: CRED_ACQ pid=5024 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:41.258268 sshd[4985]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:41.282117 kernel: kauditd_printk_skb: 256 callbacks suppressed Dec 13 03:40:41.282326 kernel: audit: type=1106 audit(1734061241.265:1337): pid=4985 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:41.265000 audit[4985]: USER_END pid=4985 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:41.270084 systemd[1]: Started sshd@14-172.24.4.167:22-172.24.4.1:38060.service. Dec 13 03:40:41.282691 systemd[1]: sshd@13-172.24.4.167:22-172.24.4.1:38050.service: Deactivated successfully. Dec 13 03:40:41.285357 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 03:40:41.301285 kernel: audit: type=1104 audit(1734061241.265:1338): pid=4985 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:41.265000 audit[4985]: CRED_DISP pid=4985 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:41.300224 systemd-logind[1133]: Session 14 logged out. Waiting for processes to exit. Dec 13 03:40:41.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.167:22-172.24.4.1:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.311726 systemd-logind[1133]: Removed session 14. Dec 13 03:40:41.312112 kernel: audit: type=1130 audit(1734061241.270:1339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.167:22-172.24.4.1:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.167:22-172.24.4.1:38050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:41.323041 kernel: audit: type=1131 audit(1734061241.282:1340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.167:22-172.24.4.1:38050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:43.195899 env[1140]: time="2024-12-13T03:40:43.195801034Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:43.205748 env[1140]: time="2024-12-13T03:40:43.205664074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:43.210187 env[1140]: time="2024-12-13T03:40:43.210114256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:43.215200 env[1140]: time="2024-12-13T03:40:43.215137193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:43.217786 env[1140]: time="2024-12-13T03:40:43.217720552Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 03:40:43.219850 env[1140]: time="2024-12-13T03:40:43.219790236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 03:40:43.319791 env[1140]: time="2024-12-13T03:40:43.319711956Z" level=info msg="CreateContainer within sandbox \"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 03:40:43.360391 env[1140]: time="2024-12-13T03:40:43.360304900Z" level=info msg="CreateContainer within sandbox \"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000\"" Dec 13 03:40:43.361758 env[1140]: time="2024-12-13T03:40:43.361682735Z" level=info msg="StartContainer for \"f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000\"" Dec 13 03:40:43.387000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.395119 kernel: audit: type=1101 audit(1734061243.387:1341): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.395297 sshd[5031]: Accepted publickey for core from 172.24.4.1 port 38060 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:43.405000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.411259 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:43.414335 kernel: audit: type=1103 audit(1734061243.405:1342): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.420187 systemd[1]: Started cri-containerd-f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000.scope. Dec 13 03:40:43.424151 kernel: audit: type=1006 audit(1734061243.405:1343): pid=5031 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 03:40:43.431184 systemd[1]: Started session-15.scope. Dec 13 03:40:43.433834 systemd-logind[1133]: New session 15 of user core. Dec 13 03:40:43.405000 audit[5031]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d4c3b10 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.443220 kernel: audit: type=1300 audit(1734061243.405:1343): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d4c3b10 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:43.452016 kernel: audit: type=1327 audit(1734061243.405:1343): proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:43.443000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.459223 kernel: audit: type=1105 audit(1734061243.443:1344): pid=5031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.445000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.472000 audit: BPF prog-id=220 op=LOAD Dec 13 03:40:43.476000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.476000 audit[5046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4767 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373463623062623463323162656265616165323431336163356366 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4767 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373463623062623463323162656265616165323431336163356366 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.477000 audit: BPF prog-id=221 op=LOAD Dec 13 03:40:43.477000 audit[5046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a2e0 items=0 ppid=4767 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373463623062623463323162656265616165323431336163356366 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.478000 audit: BPF prog-id=222 op=LOAD Dec 13 03:40:43.478000 audit[5046]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a328 items=0 ppid=4767 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373463623062623463323162656265616165323431336163356366 Dec 13 03:40:43.480000 audit: BPF prog-id=222 op=UNLOAD Dec 13 03:40:43.480000 audit: BPF prog-id=221 op=UNLOAD Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { perfmon } for pid=5046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit[5046]: AVC avc: denied { bpf } for pid=5046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:43.480000 audit: BPF prog-id=223 op=LOAD Dec 13 03:40:43.480000 audit[5046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039a738 items=0 ppid=4767 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:43.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635373463623062623463323162656265616165323431336163356366 Dec 13 03:40:43.955614 env[1140]: time="2024-12-13T03:40:43.955498491Z" level=info msg="StartContainer for \"f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000\" returns successfully" Dec 13 03:40:44.566258 kubelet[2019]: I1213 03:40:44.566225 2019 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-746c895955-cdbs4" podStartSLOduration=79.100493144 podStartE2EDuration="1m29.543868999s" podCreationTimestamp="2024-12-13 03:39:15 +0000 UTC" firstStartedPulling="2024-12-13 03:40:32.775137114 +0000 UTC m=+100.551026335" lastFinishedPulling="2024-12-13 03:40:43.218512869 +0000 UTC m=+110.994402190" observedRunningTime="2024-12-13 03:40:44.38695006 +0000 UTC m=+112.162839291" watchObservedRunningTime="2024-12-13 03:40:44.543868999 +0000 UTC m=+112.319758240" Dec 13 03:40:44.936000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:44.936000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c34ec0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:44.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:44.936000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:44.936000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012c3da0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:44.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:45.009995 sshd[5031]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:45.010000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:45.011000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:45.013889 systemd[1]: sshd@14-172.24.4.167:22-172.24.4.1:38060.service: Deactivated successfully. Dec 13 03:40:45.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.167:22-172.24.4.1:38060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:45.015284 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 03:40:45.016341 systemd-logind[1133]: Session 15 logged out. Waiting for processes to exit. Dec 13 03:40:45.018017 systemd-logind[1133]: Removed session 15. Dec 13 03:40:46.042000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.042000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0092750e0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.042000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526907 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.042000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009275110 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.042000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.042000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0062142e0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.063000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.063000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a1ec480 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.063000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.181000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.181000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009275290 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.251000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:46.251000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009355380 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:40:46.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:40:46.846410 systemd[1]: run-containerd-runc-k8s.io-0ff458bf59572877a272220f1e1308a95cddba637c326c2a3c87afea59e114e7-runc.WPiReO.mount: Deactivated successfully. Dec 13 03:40:47.100352 env[1140]: time="2024-12-13T03:40:47.099553681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:47.218933 env[1140]: time="2024-12-13T03:40:47.218333788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:47.224830 env[1140]: time="2024-12-13T03:40:47.224718100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:47.231611 env[1140]: time="2024-12-13T03:40:47.231536826Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 03:40:47.232743 env[1140]: time="2024-12-13T03:40:47.232640407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 03:40:47.308195 env[1140]: time="2024-12-13T03:40:47.307780053Z" level=info msg="CreateContainer within sandbox \"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 03:40:47.352385 env[1140]: time="2024-12-13T03:40:47.352223220Z" level=info msg="CreateContainer within sandbox \"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3c90e277f235d4f44cc83ce3c0ed8346e39f960bbbde4266ee9803d246bf5696\"" Dec 13 03:40:47.353679 env[1140]: time="2024-12-13T03:40:47.353638567Z" level=info msg="StartContainer for \"3c90e277f235d4f44cc83ce3c0ed8346e39f960bbbde4266ee9803d246bf5696\"" Dec 13 03:40:47.378337 systemd[1]: Started cri-containerd-3c90e277f235d4f44cc83ce3c0ed8346e39f960bbbde4266ee9803d246bf5696.scope. Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.456433 kernel: kauditd_printk_skb: 85 callbacks suppressed Dec 13 03:40:47.456510 kernel: audit: type=1400 audit(1734061247.449:1375): avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.456549 kernel: audit: type=1300 audit(1734061247.449:1375): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbfeccb2688 items=0 ppid=4477 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:47.449000 audit[5134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbfeccb2688 items=0 ppid=4477 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:47.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363393065323737663233356434663434636338336365336330656438 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.479010 kernel: audit: type=1327 audit(1734061247.449:1375): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363393065323737663233356434663434636338336365336330656438 Dec 13 03:40:47.479146 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.479616 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.479702 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.489466 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.495036 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.502087 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.509041 kernel: audit: type=1400 audit(1734061247.449:1376): avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.449000 audit: BPF prog-id=224 op=LOAD Dec 13 03:40:47.449000 audit[5134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000212af8 items=0 ppid=4477 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:47.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363393065323737663233356434663434636338336365336330656438 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.451000 audit: BPF prog-id=225 op=LOAD Dec 13 03:40:47.451000 audit[5134]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000212b48 items=0 ppid=4477 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:47.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363393065323737663233356434663434636338336365336330656438 Dec 13 03:40:47.462000 audit: BPF prog-id=225 op=UNLOAD Dec 13 03:40:47.462000 audit: BPF prog-id=224 op=UNLOAD Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { perfmon } for pid=5134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit[5134]: AVC avc: denied { bpf } for pid=5134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 03:40:47.462000 audit: BPF prog-id=226 op=LOAD Dec 13 03:40:47.462000 audit[5134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000212bd8 items=0 ppid=4477 pid=5134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:47.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363393065323737663233356434663434636338336365336330656438 Dec 13 03:40:47.544798 env[1140]: time="2024-12-13T03:40:47.544723218Z" level=info msg="StartContainer for \"3c90e277f235d4f44cc83ce3c0ed8346e39f960bbbde4266ee9803d246bf5696\" returns successfully" Dec 13 03:40:47.820826 systemd[1]: run-containerd-runc-k8s.io-3c90e277f235d4f44cc83ce3c0ed8346e39f960bbbde4266ee9803d246bf5696-runc.NtVLsm.mount: Deactivated successfully. Dec 13 03:40:48.799043 kubelet[2019]: I1213 03:40:48.798948 2019 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 03:40:48.812338 kubelet[2019]: I1213 03:40:48.799835 2019 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 03:40:48.960000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:48.960000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c98fc0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:48.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:48.970000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:48.970000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99140 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:48.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:48.971000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:48.971000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c99160 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:48.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:49.053000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:40:49.053000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db0320 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:40:49.053000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:40:50.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.167:22-172.24.4.1:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:50.017269 systemd[1]: Started sshd@15-172.24.4.167:22-172.24.4.1:57714.service. Dec 13 03:40:51.679000 audit[5167]: USER_ACCT pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:51.681053 sshd[5167]: Accepted publickey for core from 172.24.4.1 port 57714 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:40:51.681000 audit[5167]: CRED_ACQ pid=5167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:51.681000 audit[5167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1e1a65d0 a2=3 a3=0 items=0 ppid=1 pid=5167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:40:51.681000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:40:51.687848 sshd[5167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:40:51.697603 systemd-logind[1133]: New session 16 of user core. Dec 13 03:40:51.698504 systemd[1]: Started session-16.scope. Dec 13 03:40:51.710000 audit[5167]: USER_START pid=5167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:51.712000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:52.400421 env[1140]: time="2024-12-13T03:40:52.400293919Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.654 [WARNING][5194] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74", Pod:"calico-apiserver-5d67d6dbcf-xcg8f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia34bdaef256", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.662 [INFO][5194] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.662 [INFO][5194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" iface="eth0" netns="" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.663 [INFO][5194] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.663 [INFO][5194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.741 [INFO][5200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.742 [INFO][5200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.742 [INFO][5200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.752 [WARNING][5200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.752 [INFO][5200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.754 [INFO][5200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:52.760684 env[1140]: 2024-12-13 03:40:52.757 [INFO][5194] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:52.761422 env[1140]: time="2024-12-13T03:40:52.761383443Z" level=info msg="TearDown network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" successfully" Dec 13 03:40:52.761497 env[1140]: time="2024-12-13T03:40:52.761479212Z" level=info msg="StopPodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" returns successfully" Dec 13 03:40:52.944068 env[1140]: time="2024-12-13T03:40:52.942396203Z" level=info msg="RemovePodSandbox for \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:52.944068 env[1140]: time="2024-12-13T03:40:52.942537648Z" level=info msg="Forcibly stopping sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\"" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.051 [WARNING][5222] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"a0d1c06e-1ad7-45d6-8d62-f5a66cad1314", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"e16be53c83dc7e8cb78267b2bd90a2b66b08e2dd6ffee106bef30db48b3d1a74", Pod:"calico-apiserver-5d67d6dbcf-xcg8f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia34bdaef256", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.052 [INFO][5222] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.052 [INFO][5222] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" iface="eth0" netns="" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.052 [INFO][5222] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.052 [INFO][5222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.093 [INFO][5228] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.093 [INFO][5228] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.093 [INFO][5228] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.119 [WARNING][5228] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.119 [INFO][5228] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" HandleID="k8s-pod-network.1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--xcg8f-eth0" Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.129 [INFO][5228] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:53.135377 env[1140]: 2024-12-13 03:40:53.132 [INFO][5222] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1" Dec 13 03:40:53.156138 env[1140]: time="2024-12-13T03:40:53.135417617Z" level=info msg="TearDown network for sandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" successfully" Dec 13 03:40:53.219267 env[1140]: time="2024-12-13T03:40:53.219131138Z" level=info msg="RemovePodSandbox \"1c9a4c5bfa43cdfca2c78caaf5687fcf22cadda3ca4daf89ac958051f0e459f1\" returns successfully" Dec 13 03:40:53.382462 env[1140]: time="2024-12-13T03:40:53.382422158Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.461 [WARNING][5247] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f1d0841-8d75-4c73-a853-4ede410b6584", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14", Pod:"calico-apiserver-5d67d6dbcf-sv9cc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d81b70d112", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.462 [INFO][5247] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.462 [INFO][5247] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" iface="eth0" netns="" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.462 [INFO][5247] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.462 [INFO][5247] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.521 [INFO][5255] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.521 [INFO][5255] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.521 [INFO][5255] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.530 [WARNING][5255] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.530 [INFO][5255] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.531 [INFO][5255] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:53.536270 env[1140]: 2024-12-13 03:40:53.534 [INFO][5247] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.537418 env[1140]: time="2024-12-13T03:40:53.537361586Z" level=info msg="TearDown network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" successfully" Dec 13 03:40:53.538539 env[1140]: time="2024-12-13T03:40:53.537525143Z" level=info msg="StopPodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" returns successfully" Dec 13 03:40:53.590791 env[1140]: time="2024-12-13T03:40:53.590736703Z" level=info msg="RemovePodSandbox for \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:40:53.590944 env[1140]: time="2024-12-13T03:40:53.590792938Z" level=info msg="Forcibly stopping sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\"" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.679 [WARNING][5276] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0", GenerateName:"calico-apiserver-5d67d6dbcf-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f1d0841-8d75-4c73-a853-4ede410b6584", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5d67d6dbcf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"53ae44c13d374a2e95b1a6dbf810d354fd9aea3697ed385736147be6e6cd9c14", Pod:"calico-apiserver-5d67d6dbcf-sv9cc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.124.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d81b70d112", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.679 [INFO][5276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.679 [INFO][5276] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" iface="eth0" netns="" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.679 [INFO][5276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.679 [INFO][5276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.732 [INFO][5282] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.732 [INFO][5282] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.732 [INFO][5282] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.741 [WARNING][5282] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.741 [INFO][5282] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" HandleID="k8s-pod-network.bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--apiserver--5d67d6dbcf--sv9cc-eth0" Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.745 [INFO][5282] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:53.750554 env[1140]: 2024-12-13 03:40:53.748 [INFO][5276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f" Dec 13 03:40:53.751861 env[1140]: time="2024-12-13T03:40:53.751291819Z" level=info msg="TearDown network for sandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" successfully" Dec 13 03:40:53.755900 env[1140]: time="2024-12-13T03:40:53.755835075Z" level=info msg="RemovePodSandbox \"bc0ef08c1d7a5466d739ab1ee71eb4e5ce0af7b8a6efba3f7869e8fd12a89d6f\" returns successfully" Dec 13 03:40:53.798371 env[1140]: time="2024-12-13T03:40:53.798273057Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.028 [WARNING][5301] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0", GenerateName:"calico-kube-controllers-746c895955-", Namespace:"calico-system", SelfLink:"", UID:"ae02de06-006f-4364-afd7-4f696b4572fa", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"746c895955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45", Pod:"calico-kube-controllers-746c895955-cdbs4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.124.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali638c6061040", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.029 [INFO][5301] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.029 [INFO][5301] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" iface="eth0" netns="" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.029 [INFO][5301] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.029 [INFO][5301] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.058 [INFO][5307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.059 [INFO][5307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.059 [INFO][5307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.066 [WARNING][5307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.066 [INFO][5307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.068 [INFO][5307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.072407 env[1140]: 2024-12-13 03:40:54.070 [INFO][5301] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.074659 env[1140]: time="2024-12-13T03:40:54.073107014Z" level=info msg="TearDown network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" successfully" Dec 13 03:40:54.074659 env[1140]: time="2024-12-13T03:40:54.073159973Z" level=info msg="StopPodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" returns successfully" Dec 13 03:40:54.074659 env[1140]: time="2024-12-13T03:40:54.074235762Z" level=info msg="RemovePodSandbox for \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:54.074659 env[1140]: time="2024-12-13T03:40:54.074276619Z" level=info msg="Forcibly stopping sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\"" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.131 [WARNING][5326] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0", GenerateName:"calico-kube-controllers-746c895955-", Namespace:"calico-system", SelfLink:"", UID:"ae02de06-006f-4364-afd7-4f696b4572fa", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"746c895955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"9b49998df2c044342a38e8be27a3f9cfa74d2e9149b87511bae2a802df4c8c45", Pod:"calico-kube-controllers-746c895955-cdbs4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.124.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali638c6061040", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.131 [INFO][5326] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.131 [INFO][5326] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" iface="eth0" netns="" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.131 [INFO][5326] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.131 [INFO][5326] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.156 [INFO][5333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.156 [INFO][5333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.157 [INFO][5333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.167 [WARNING][5333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.167 [INFO][5333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" HandleID="k8s-pod-network.3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-calico--kube--controllers--746c895955--cdbs4-eth0" Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.168 [INFO][5333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.173116 env[1140]: 2024-12-13 03:40:54.171 [INFO][5326] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50" Dec 13 03:40:54.174573 env[1140]: time="2024-12-13T03:40:54.173780121Z" level=info msg="TearDown network for sandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" successfully" Dec 13 03:40:54.179475 env[1140]: time="2024-12-13T03:40:54.179448429Z" level=info msg="RemovePodSandbox \"3ac5cd74e2c69b6037e2ee64804427d617bd0101c860089b85187418caa62b50\" returns successfully" Dec 13 03:40:54.180078 env[1140]: time="2024-12-13T03:40:54.180030370Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.226 [WARNING][5352] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ee472d7b-bab8-4369-b29f-b404b9bc9acc", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3", Pod:"coredns-76f75df574-jdwm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali203a7bd5755", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.226 [INFO][5352] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.226 [INFO][5352] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" iface="eth0" netns="" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.226 [INFO][5352] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.226 [INFO][5352] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.251 [INFO][5358] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.251 [INFO][5358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.251 [INFO][5358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.260 [WARNING][5358] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.260 [INFO][5358] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.262 [INFO][5358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.266818 env[1140]: 2024-12-13 03:40:54.264 [INFO][5352] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.268114 env[1140]: time="2024-12-13T03:40:54.267432693Z" level=info msg="TearDown network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" successfully" Dec 13 03:40:54.268114 env[1140]: time="2024-12-13T03:40:54.267464293Z" level=info msg="StopPodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" returns successfully" Dec 13 03:40:54.268114 env[1140]: time="2024-12-13T03:40:54.267939164Z" level=info msg="RemovePodSandbox for \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:54.268313 env[1140]: time="2024-12-13T03:40:54.267967988Z" level=info msg="Forcibly stopping sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\"" Dec 13 03:40:54.291239 sshd[5167]: pam_unix(sshd:session): session closed for user core Dec 13 03:40:54.294025 kernel: kauditd_printk_skb: 53 callbacks suppressed Dec 13 03:40:54.294149 kernel: audit: type=1106 audit(1734061254.291:1391): pid=5167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:54.291000 audit[5167]: USER_END pid=5167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:54.298995 systemd[1]: sshd@15-172.24.4.167:22-172.24.4.1:57714.service: Deactivated successfully. Dec 13 03:40:54.299838 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 03:40:54.291000 audit[5167]: CRED_DISP pid=5167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:54.300714 systemd-logind[1133]: Session 16 logged out. Waiting for processes to exit. Dec 13 03:40:54.305320 kernel: audit: type=1104 audit(1734061254.291:1392): pid=5167 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:40:54.305424 kernel: audit: type=1131 audit(1734061254.298:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.167:22-172.24.4.1:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:54.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.167:22-172.24.4.1:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:54.310095 systemd-logind[1133]: Removed session 16. Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.323 [WARNING][5379] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ee472d7b-bab8-4369-b29f-b404b9bc9acc", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"effb227c583643155634332381cb5a51a9537ec0b50155cc2841790aa08c13d3", Pod:"coredns-76f75df574-jdwm9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali203a7bd5755", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.324 [INFO][5379] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.324 [INFO][5379] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" iface="eth0" netns="" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.324 [INFO][5379] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.324 [INFO][5379] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.353 [INFO][5387] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.354 [INFO][5387] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.354 [INFO][5387] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.363 [WARNING][5387] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.363 [INFO][5387] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" HandleID="k8s-pod-network.8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--jdwm9-eth0" Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.366 [INFO][5387] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.372136 env[1140]: 2024-12-13 03:40:54.367 [INFO][5379] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e" Dec 13 03:40:54.372136 env[1140]: time="2024-12-13T03:40:54.371084902Z" level=info msg="TearDown network for sandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" successfully" Dec 13 03:40:54.375496 env[1140]: time="2024-12-13T03:40:54.375450975Z" level=info msg="RemovePodSandbox \"8643b48c4898076fef640331ca7d786460ba804a38d22c1315525057b918bf7e\" returns successfully" Dec 13 03:40:54.375967 env[1140]: time="2024-12-13T03:40:54.375930255Z" level=info msg="StopPodSandbox for \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\"" Dec 13 03:40:54.376086 env[1140]: time="2024-12-13T03:40:54.376039180Z" level=info msg="TearDown network for sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" successfully" Dec 13 03:40:54.376125 env[1140]: time="2024-12-13T03:40:54.376079645Z" level=info msg="StopPodSandbox for \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" returns successfully" Dec 13 03:40:54.376434 env[1140]: time="2024-12-13T03:40:54.376406318Z" level=info msg="RemovePodSandbox for \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\"" Dec 13 03:40:54.376486 env[1140]: time="2024-12-13T03:40:54.376437446Z" level=info msg="Forcibly stopping sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\"" Dec 13 03:40:54.376541 env[1140]: time="2024-12-13T03:40:54.376517527Z" level=info msg="TearDown network for sandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" successfully" Dec 13 03:40:54.381079 env[1140]: time="2024-12-13T03:40:54.381026008Z" level=info msg="RemovePodSandbox \"1e5537920a7659054ce76a5eba9dedfb30ff001bcfcc0ccde5aba32d937409e8\" returns successfully" Dec 13 03:40:54.381466 env[1140]: time="2024-12-13T03:40:54.381429144Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.432 [WARNING][5405] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0511a489-3ef6-4634-bda9-6280d50164d6", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93", Pod:"csi-node-driver-9vdvk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali872c0737a0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.433 [INFO][5405] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.433 [INFO][5405] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" iface="eth0" netns="" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.433 [INFO][5405] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.433 [INFO][5405] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.462 [INFO][5412] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.462 [INFO][5412] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.462 [INFO][5412] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.470 [WARNING][5412] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.470 [INFO][5412] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.472 [INFO][5412] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.476245 env[1140]: 2024-12-13 03:40:54.473 [INFO][5405] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.477852 env[1140]: time="2024-12-13T03:40:54.476733627Z" level=info msg="TearDown network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" successfully" Dec 13 03:40:54.477852 env[1140]: time="2024-12-13T03:40:54.476778421Z" level=info msg="StopPodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" returns successfully" Dec 13 03:40:54.477852 env[1140]: time="2024-12-13T03:40:54.477375001Z" level=info msg="RemovePodSandbox for \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:54.478068 env[1140]: time="2024-12-13T03:40:54.478012447Z" level=info msg="Forcibly stopping sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\"" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.530 [WARNING][5430] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0511a489-3ef6-4634-bda9-6280d50164d6", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"ff51876795412204b5fe1cdd4b587f3137ad7ccfb1660d60e4df331ad14a6b93", Pod:"csi-node-driver-9vdvk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali872c0737a0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.532 [INFO][5430] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.532 [INFO][5430] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" iface="eth0" netns="" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.532 [INFO][5430] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.532 [INFO][5430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.560 [INFO][5436] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.560 [INFO][5436] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.560 [INFO][5436] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.573 [WARNING][5436] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.574 [INFO][5436] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" HandleID="k8s-pod-network.a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-csi--node--driver--9vdvk-eth0" Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.578 [INFO][5436] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.585008 env[1140]: 2024-12-13 03:40:54.581 [INFO][5430] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a" Dec 13 03:40:54.586775 env[1140]: time="2024-12-13T03:40:54.586228079Z" level=info msg="TearDown network for sandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" successfully" Dec 13 03:40:54.593251 env[1140]: time="2024-12-13T03:40:54.593202848Z" level=info msg="RemovePodSandbox \"a3b4a5664c02f34ace7b124d42a2f22d27ae8c990f9836db1e81db2cb23c6d5a\" returns successfully" Dec 13 03:40:54.593669 env[1140]: time="2024-12-13T03:40:54.593637894Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.661 [WARNING][5456] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"798eee9e-c412-481d-ae46-a472fa8e2ee0", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b", Pod:"coredns-76f75df574-9ldmh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali893eb220171", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.661 [INFO][5456] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.661 [INFO][5456] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" iface="eth0" netns="" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.661 [INFO][5456] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.661 [INFO][5456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.692 [INFO][5462] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.692 [INFO][5462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.692 [INFO][5462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.699 [WARNING][5462] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.699 [INFO][5462] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.701 [INFO][5462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.705483 env[1140]: 2024-12-13 03:40:54.703 [INFO][5456] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.707160 env[1140]: time="2024-12-13T03:40:54.706038701Z" level=info msg="TearDown network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" successfully" Dec 13 03:40:54.707160 env[1140]: time="2024-12-13T03:40:54.706077534Z" level=info msg="StopPodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" returns successfully" Dec 13 03:40:54.707160 env[1140]: time="2024-12-13T03:40:54.706612758Z" level=info msg="RemovePodSandbox for \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:54.707160 env[1140]: time="2024-12-13T03:40:54.706664195Z" level=info msg="Forcibly stopping sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\"" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.754 [WARNING][5480] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"798eee9e-c412-481d-ae46-a472fa8e2ee0", ResourceVersion:"1017", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 3, 39, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-5-2a90ac038f.novalocal", ContainerID:"c09e92abf8ab456db334cf9447aa4d9a7975b4589aa71605df38c9b6b52ccc8b", Pod:"coredns-76f75df574-9ldmh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.124.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali893eb220171", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.754 [INFO][5480] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.754 [INFO][5480] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" iface="eth0" netns="" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.754 [INFO][5480] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.754 [INFO][5480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.798 [INFO][5487] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.799 [INFO][5487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.799 [INFO][5487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.806 [WARNING][5487] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.806 [INFO][5487] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" HandleID="k8s-pod-network.e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Workload="ci--3510--3--6--5--2a90ac038f.novalocal-k8s-coredns--76f75df574--9ldmh-eth0" Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.808 [INFO][5487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 03:40:54.812879 env[1140]: 2024-12-13 03:40:54.810 [INFO][5480] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad" Dec 13 03:40:54.814906 env[1140]: time="2024-12-13T03:40:54.812951237Z" level=info msg="TearDown network for sandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" successfully" Dec 13 03:40:54.817043 env[1140]: time="2024-12-13T03:40:54.816963747Z" level=info msg="RemovePodSandbox \"e6858e8e885daafd84159f237cc43b043ede0a9e31ca304545b93d02f5895bad\" returns successfully" Dec 13 03:40:59.302691 systemd[1]: Started sshd@16-172.24.4.167:22-172.24.4.1:60154.service. Dec 13 03:40:59.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.167:22-172.24.4.1:60154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:40:59.316140 kernel: audit: type=1130 audit(1734061259.303:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.167:22-172.24.4.1:60154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:00.352000 audit[5497]: USER_ACCT pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.366810 sshd[5497]: Accepted publickey for core from 172.24.4.1 port 60154 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:00.379403 kernel: audit: type=1101 audit(1734061260.352:1395): pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.379565 kernel: audit: type=1103 audit(1734061260.365:1396): pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.388793 kernel: audit: type=1006 audit(1734061260.366:1397): pid=5497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 03:41:00.389014 kernel: audit: type=1300 audit(1734061260.366:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe148c3390 a2=3 a3=0 items=0 ppid=1 pid=5497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:00.365000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.366000 audit[5497]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe148c3390 a2=3 a3=0 items=0 ppid=1 pid=5497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:00.368249 sshd[5497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:00.394531 systemd[1]: Started session-17.scope. Dec 13 03:41:00.397893 systemd-logind[1133]: New session 17 of user core. Dec 13 03:41:00.400271 kernel: audit: type=1327 audit(1734061260.366:1397): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:00.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:00.417000 audit[5497]: USER_START pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.433045 kernel: audit: type=1105 audit(1734061260.417:1398): pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.433309 kernel: audit: type=1103 audit(1734061260.421:1399): pid=5499 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:00.421000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:01.207207 sshd[5497]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:01.208000 audit[5497]: USER_END pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:01.223051 kernel: audit: type=1106 audit(1734061261.208:1400): pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:01.223030 systemd[1]: sshd@16-172.24.4.167:22-172.24.4.1:60154.service: Deactivated successfully. Dec 13 03:41:01.208000 audit[5497]: CRED_DISP pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:01.225056 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 03:41:01.236045 kernel: audit: type=1104 audit(1734061261.208:1401): pid=5497 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:01.237062 systemd-logind[1133]: Session 17 logged out. Waiting for processes to exit. Dec 13 03:41:01.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.167:22-172.24.4.1:60154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:01.239522 systemd-logind[1133]: Removed session 17. Dec 13 03:41:06.234445 systemd[1]: Started sshd@17-172.24.4.167:22-172.24.4.1:42274.service. Dec 13 03:41:06.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.167:22-172.24.4.1:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:06.273727 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:41:06.273868 kernel: audit: type=1130 audit(1734061266.234:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.167:22-172.24.4.1:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:06.501404 systemd[1]: run-containerd-runc-k8s.io-f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000-runc.J2i7vw.mount: Deactivated successfully. Dec 13 03:41:07.952000 audit[5520]: USER_ACCT pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:07.959730 sshd[5520]: Accepted publickey for core from 172.24.4.1 port 42274 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:07.960116 kernel: audit: type=1101 audit(1734061267.952:1404): pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:07.972143 kernel: audit: type=1103 audit(1734061267.958:1405): pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:07.958000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:07.964169 sshd[5520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:07.987196 kernel: audit: type=1006 audit(1734061267.958:1406): pid=5520 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 03:41:07.958000 audit[5520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde056dc30 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:07.991378 systemd[1]: Started session-18.scope. Dec 13 03:41:07.999027 kernel: audit: type=1300 audit(1734061267.958:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde056dc30 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:08.000280 systemd-logind[1133]: New session 18 of user core. Dec 13 03:41:07.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:08.008451 kernel: audit: type=1327 audit(1734061267.958:1406): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:08.014000 audit[5520]: USER_START pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:08.021022 kernel: audit: type=1105 audit(1734061268.014:1407): pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:08.021000 audit[5542]: CRED_ACQ pid=5542 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:08.028014 kernel: audit: type=1103 audit(1734061268.021:1408): pid=5542 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:08.588711 systemd[1]: run-containerd-runc-k8s.io-f574cb0bb4c21bebeaae2413ac5cf40cf69950b6feee3ec010e0d98caaad8000-runc.CytZT6.mount: Deactivated successfully. Dec 13 03:41:09.025185 sshd[5520]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:09.035953 kernel: audit: type=1106 audit(1734061269.025:1409): pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:09.038320 kernel: audit: type=1104 audit(1734061269.025:1410): pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:09.025000 audit[5520]: USER_END pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:09.025000 audit[5520]: CRED_DISP pid=5520 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:09.032602 systemd[1]: sshd@17-172.24.4.167:22-172.24.4.1:42274.service: Deactivated successfully. Dec 13 03:41:09.034872 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 03:41:09.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.167:22-172.24.4.1:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:09.044815 systemd-logind[1133]: Session 18 logged out. Waiting for processes to exit. Dec 13 03:41:09.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.167:22-172.24.4.1:42276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:09.047260 systemd[1]: Started sshd@18-172.24.4.167:22-172.24.4.1:42276.service. Dec 13 03:41:09.049646 systemd-logind[1133]: Removed session 18. Dec 13 03:41:10.207486 sshd[5571]: Accepted publickey for core from 172.24.4.1 port 42276 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:10.206000 audit[5571]: USER_ACCT pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:10.212000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:10.213000 audit[5571]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5e27b660 a2=3 a3=0 items=0 ppid=1 pid=5571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:10.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:10.216155 sshd[5571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:10.230140 systemd-logind[1133]: New session 19 of user core. Dec 13 03:41:10.231552 systemd[1]: Started session-19.scope. Dec 13 03:41:10.252000 audit[5571]: USER_START pid=5571 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:10.256000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:13.308819 sshd[5571]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:13.334457 kernel: kauditd_printk_skb: 9 callbacks suppressed Dec 13 03:41:13.334659 kernel: audit: type=1106 audit(1734061273.316:1418): pid=5571 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:13.316000 audit[5571]: USER_END pid=5571 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:13.331000 audit[5571]: CRED_DISP pid=5571 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:13.343967 systemd[1]: Started sshd@19-172.24.4.167:22-172.24.4.1:42284.service. Dec 13 03:41:13.352004 kernel: audit: type=1104 audit(1734061273.331:1419): pid=5571 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:13.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.167:22-172.24.4.1:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:13.357501 systemd[1]: sshd@18-172.24.4.167:22-172.24.4.1:42276.service: Deactivated successfully. Dec 13 03:41:13.359429 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 03:41:13.366015 kernel: audit: type=1130 audit(1734061273.344:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.167:22-172.24.4.1:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:13.366158 kernel: audit: type=1131 audit(1734061273.356:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.167:22-172.24.4.1:42276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:13.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.167:22-172.24.4.1:42276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:13.372875 systemd-logind[1133]: Session 19 logged out. Waiting for processes to exit. Dec 13 03:41:13.374279 systemd-logind[1133]: Removed session 19. Dec 13 03:41:14.802000 audit[5582]: USER_ACCT pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.806608 sshd[5582]: Accepted publickey for core from 172.24.4.1 port 42284 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:14.816029 kernel: audit: type=1101 audit(1734061274.802:1422): pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.825906 kernel: audit: type=1103 audit(1734061274.804:1423): pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.804000 audit[5582]: CRED_ACQ pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.816371 sshd[5582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:14.835011 kernel: audit: type=1006 audit(1734061274.804:1424): pid=5582 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 03:41:14.834684 systemd-logind[1133]: New session 20 of user core. Dec 13 03:41:14.804000 audit[5582]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb756fa50 a2=3 a3=0 items=0 ppid=1 pid=5582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:14.836638 systemd[1]: Started session-20.scope. Dec 13 03:41:14.841087 kernel: audit: type=1300 audit(1734061274.804:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb756fa50 a2=3 a3=0 items=0 ppid=1 pid=5582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:14.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:14.846004 kernel: audit: type=1327 audit(1734061274.804:1424): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:14.852000 audit[5582]: USER_START pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.861018 kernel: audit: type=1105 audit(1734061274.852:1425): pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:14.854000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:18.915404 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:41:18.915785 kernel: audit: type=1325 audit(1734061278.904:1427): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.904000 audit[5618]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.951022 kernel: audit: type=1300 audit(1734061278.904:1427): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff99a75120 a2=0 a3=7fff99a7510c items=0 ppid=2156 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.953310 kernel: audit: type=1327 audit(1734061278.904:1427): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:18.953357 kernel: audit: type=1130 audit(1734061278.937:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.167:22-172.24.4.1:45838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:18.904000 audit[5618]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff99a75120 a2=0 a3=7fff99a7510c items=0 ppid=2156 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:18.965198 kernel: audit: type=1106 audit(1734061278.954:1429): pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:18.966753 kernel: audit: type=1325 audit(1734061278.955:1430): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.167:22-172.24.4.1:45838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:18.954000 audit[5582]: USER_END pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:18.955000 audit[5618]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.938318 systemd[1]: Started sshd@20-172.24.4.167:22-172.24.4.1:45838.service. Dec 13 03:41:18.976636 kernel: audit: type=1300 audit(1734061278.955:1430): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff99a75120 a2=0 a3=0 items=0 ppid=2156 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.955000 audit[5618]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff99a75120 a2=0 a3=0 items=0 ppid=2156 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.942900 sshd[5582]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:18.964006 systemd[1]: sshd@19-172.24.4.167:22-172.24.4.1:42284.service: Deactivated successfully. Dec 13 03:41:18.985441 kernel: audit: type=1327 audit(1734061278.955:1430): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:18.988023 kernel: audit: type=1104 audit(1734061278.961:1431): pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:18.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:18.961000 audit[5582]: CRED_DISP pid=5582 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:18.964821 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 03:41:18.972188 systemd-logind[1133]: Session 20 logged out. Waiting for processes to exit. Dec 13 03:41:18.973726 systemd-logind[1133]: Removed session 20. Dec 13 03:41:18.989968 kernel: audit: type=1131 audit(1734061278.963:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.167:22-172.24.4.1:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:18.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.167:22-172.24.4.1:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:18.994000 audit[5623]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.994000 audit[5623]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd3946d590 a2=0 a3=7ffd3946d57c items=0 ppid=2156 pid=5623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:18.999000 audit[5623]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:18.999000 audit[5623]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd3946d590 a2=0 a3=0 items=0 ppid=2156 pid=5623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:18.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:20.426000 audit[5620]: USER_ACCT pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:20.429085 sshd[5620]: Accepted publickey for core from 172.24.4.1 port 45838 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:20.429000 audit[5620]: CRED_ACQ pid=5620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:20.429000 audit[5620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe352f5690 a2=3 a3=0 items=0 ppid=1 pid=5620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:20.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:20.433463 sshd[5620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:20.445311 systemd[1]: Started session-21.scope. Dec 13 03:41:20.446176 systemd-logind[1133]: New session 21 of user core. Dec 13 03:41:20.460000 audit[5620]: USER_START pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:20.463000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:22.647032 sshd[5620]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:22.649000 audit[5620]: USER_END pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:22.649000 audit[5620]: CRED_DISP pid=5620 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:22.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.167:22-172.24.4.1:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:22.652374 systemd[1]: Started sshd@21-172.24.4.167:22-172.24.4.1:45854.service. Dec 13 03:41:22.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.167:22-172.24.4.1:45838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:22.654208 systemd[1]: sshd@20-172.24.4.167:22-172.24.4.1:45838.service: Deactivated successfully. Dec 13 03:41:22.655062 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 03:41:22.660178 systemd-logind[1133]: Session 21 logged out. Waiting for processes to exit. Dec 13 03:41:22.663739 systemd-logind[1133]: Removed session 21. Dec 13 03:41:23.934640 sshd[5632]: Accepted publickey for core from 172.24.4.1 port 45854 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:23.948223 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 03:41:23.948387 kernel: audit: type=1101 audit(1734061283.933:1444): pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:23.933000 audit[5632]: USER_ACCT pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:23.947000 audit[5632]: CRED_ACQ pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:23.961873 sshd[5632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:23.966119 kernel: audit: type=1103 audit(1734061283.947:1445): pid=5632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:23.966282 kernel: audit: type=1006 audit(1734061283.947:1446): pid=5632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 03:41:23.947000 audit[5632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe60c1a610 a2=3 a3=0 items=0 ppid=1 pid=5632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:23.980317 kernel: audit: type=1300 audit(1734061283.947:1446): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe60c1a610 a2=3 a3=0 items=0 ppid=1 pid=5632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:23.980523 kernel: audit: type=1327 audit(1734061283.947:1446): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:23.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:23.986607 systemd[1]: Started session-22.scope. Dec 13 03:41:23.987645 systemd-logind[1133]: New session 22 of user core. Dec 13 03:41:24.001000 audit[5632]: USER_START pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.002000 audit[5635]: CRED_ACQ pid=5635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.062121 kernel: audit: type=1105 audit(1734061284.001:1447): pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.062218 kernel: audit: type=1103 audit(1734061284.002:1448): pid=5635 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.944335 sshd[5632]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:24.963040 kernel: audit: type=1106 audit(1734061284.946:1449): pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.946000 audit[5632]: USER_END pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.951665 systemd-logind[1133]: Session 22 logged out. Waiting for processes to exit. Dec 13 03:41:24.963590 systemd[1]: sshd@21-172.24.4.167:22-172.24.4.1:45854.service: Deactivated successfully. Dec 13 03:41:24.946000 audit[5632]: CRED_DISP pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.971039 kernel: audit: type=1104 audit(1734061284.946:1450): pid=5632 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:24.965429 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 03:41:24.968891 systemd-logind[1133]: Removed session 22. Dec 13 03:41:24.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.167:22-172.24.4.1:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:24.976014 kernel: audit: type=1131 audit(1734061284.963:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.167:22-172.24.4.1:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:29.766000 audit[5644]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:29.775064 kernel: audit: type=1325 audit(1734061289.766:1452): table=filter:127 family=2 entries=20 op=nft_register_rule pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:29.775204 kernel: audit: type=1300 audit(1734061289.766:1452): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff5bcd600 a2=0 a3=7ffff5bcd5ec items=0 ppid=2156 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.766000 audit[5644]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff5bcd600 a2=0 a3=7ffff5bcd5ec items=0 ppid=2156 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:29.793218 kernel: audit: type=1327 audit(1734061289.766:1452): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:29.797000 audit[5644]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:29.807028 kernel: audit: type=1325 audit(1734061289.797:1453): table=nat:128 family=2 entries=106 op=nft_register_chain pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 03:41:29.807162 kernel: audit: type=1300 audit(1734061289.797:1453): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff5bcd600 a2=0 a3=7ffff5bcd5ec items=0 ppid=2156 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.797000 audit[5644]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff5bcd600 a2=0 a3=7ffff5bcd5ec items=0 ppid=2156 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:29.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:29.815636 kernel: audit: type=1327 audit(1734061289.797:1453): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 03:41:29.959636 systemd[1]: Started sshd@22-172.24.4.167:22-172.24.4.1:50052.service. Dec 13 03:41:29.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.167:22-172.24.4.1:50052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:29.971177 kernel: audit: type=1130 audit(1734061289.960:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.167:22-172.24.4.1:50052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:31.121000 audit[5647]: USER_ACCT pid=5647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:31.134147 kernel: audit: type=1101 audit(1734061291.121:1455): pid=5647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:31.134235 sshd[5647]: Accepted publickey for core from 172.24.4.1 port 50052 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:31.136000 audit[5647]: CRED_ACQ pid=5647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:31.139682 sshd[5647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:31.148134 kernel: audit: type=1103 audit(1734061291.136:1456): pid=5647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:31.156694 kernel: audit: type=1006 audit(1734061291.136:1457): pid=5647 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 03:41:31.136000 audit[5647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1dcffb20 a2=3 a3=0 items=0 ppid=1 pid=5647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:31.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:31.167529 systemd-logind[1133]: New session 23 of user core. Dec 13 03:41:31.167591 systemd[1]: Started session-23.scope. Dec 13 03:41:31.184000 audit[5647]: USER_START pid=5647 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:31.188000 audit[5649]: CRED_ACQ pid=5649 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:32.121917 sshd[5647]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:32.122000 audit[5647]: USER_END pid=5647 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:32.122000 audit[5647]: CRED_DISP pid=5647 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:32.125517 systemd[1]: sshd@22-172.24.4.167:22-172.24.4.1:50052.service: Deactivated successfully. Dec 13 03:41:32.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.167:22-172.24.4.1:50052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:32.127193 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 03:41:32.128251 systemd-logind[1133]: Session 23 logged out. Waiting for processes to exit. Dec 13 03:41:32.129644 systemd-logind[1133]: Removed session 23. Dec 13 03:41:37.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.167:22-172.24.4.1:54512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:37.135192 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 03:41:37.135286 kernel: audit: type=1130 audit(1734061297.131:1463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.167:22-172.24.4.1:54512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:37.132244 systemd[1]: Started sshd@23-172.24.4.167:22-172.24.4.1:54512.service. Dec 13 03:41:38.508000 audit[4873]: AVC avc: denied { watch } for pid=4873 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_39_36.3862089968/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c378,c996 tclass=file permissive=0 Dec 13 03:41:38.508000 audit[4873]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b5b600 a2=fc6 a3=0 items=0 ppid=4372 pid=4873 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 key=(null) Dec 13 03:41:38.526022 kernel: audit: type=1400 audit(1734061298.508:1464): avc: denied { watch } for pid=4873 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_39_36.3862089968/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c378,c996 tclass=file permissive=0 Dec 13 03:41:38.526113 kernel: audit: type=1300 audit(1734061298.508:1464): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b5b600 a2=fc6 a3=0 items=0 ppid=4372 pid=4873 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c996 key=(null) Dec 13 03:41:38.508000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:41:38.533160 kernel: audit: type=1327 audit(1734061298.508:1464): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:41:38.677000 audit[5680]: USER_ACCT pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.685798 kernel: audit: type=1101 audit(1734061298.677:1465): pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.685869 sshd[5680]: Accepted publickey for core from 172.24.4.1 port 54512 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:38.685000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.691042 kernel: audit: type=1103 audit(1734061298.685:1466): pid=5680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.685000 audit[5680]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe227d3d70 a2=3 a3=0 items=0 ppid=1 pid=5680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:38.695045 sshd[5680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:38.698908 kernel: audit: type=1006 audit(1734061298.685:1467): pid=5680 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 03:41:38.698947 kernel: audit: type=1300 audit(1734061298.685:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe227d3d70 a2=3 a3=0 items=0 ppid=1 pid=5680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:38.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:38.702003 kernel: audit: type=1327 audit(1734061298.685:1467): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:38.706448 systemd-logind[1133]: New session 24 of user core. Dec 13 03:41:38.707066 systemd[1]: Started session-24.scope. Dec 13 03:41:38.712000 audit[5680]: USER_START pid=5680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.717000 audit[5682]: CRED_ACQ pid=5682 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:38.719040 kernel: audit: type=1105 audit(1734061298.712:1468): pid=5680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:39.337000 audit[4953]: AVC avc: denied { watch } for pid=4953 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_03_39_36.2873266221/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c34,c879 tclass=file permissive=0 Dec 13 03:41:39.337000 audit[4953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00113cda0 a2=fc6 a3=0 items=0 ppid=4885 pid=4953 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c879 key=(null) Dec 13 03:41:39.337000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 03:41:39.730263 sshd[5680]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:39.731000 audit[5680]: USER_END pid=5680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:39.731000 audit[5680]: CRED_DISP pid=5680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:39.734299 systemd[1]: sshd@23-172.24.4.167:22-172.24.4.1:54512.service: Deactivated successfully. Dec 13 03:41:39.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.167:22-172.24.4.1:54512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:39.735270 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 03:41:39.736658 systemd-logind[1133]: Session 24 logged out. Waiting for processes to exit. Dec 13 03:41:39.739311 systemd-logind[1133]: Removed session 24. Dec 13 03:41:44.743498 systemd[1]: Started sshd@24-172.24.4.167:22-172.24.4.1:38756.service. Dec 13 03:41:44.757285 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 03:41:44.757357 kernel: audit: type=1130 audit(1734061304.743:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.167:22-172.24.4.1:38756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:44.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.167:22-172.24.4.1:38756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:44.954000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:44.954000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00210def0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:44.983795 kernel: audit: type=1400 audit(1734061304.954:1475): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:44.984022 kernel: audit: type=1300 audit(1734061304.954:1475): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00210def0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:44.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:44.955000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:45.007678 kernel: audit: type=1327 audit(1734061304.954:1475): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:45.007803 kernel: audit: type=1400 audit(1734061304.955:1476): avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:44.955000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001791460 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:45.022023 kernel: audit: type=1300 audit(1734061304.955:1476): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001791460 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:45.022274 kernel: audit: type=1327 audit(1734061304.955:1476): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:44.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:46.078000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.078000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00df51aa0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.105363 kernel: audit: type=1400 audit(1734061306.078:1477): avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.105551 kernel: audit: type=1300 audit(1734061306.078:1477): arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00df51aa0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.117546 kernel: audit: type=1327 audit(1734061306.078:1477): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.182000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.182000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0041f8180 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.189000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.189000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0041f82a0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.189000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526907 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.189000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0041f8780 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.190000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.190000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00df51ac0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.252000 audit[1910]: AVC avc: denied { watch } for pid=1910 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526905 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:46.252000 audit[1910]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0092ef5c0 a2=fc6 a3=0 items=0 ppid=1755 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c438 key=(null) Dec 13 03:41:46.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313637002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 03:41:46.375000 audit[5691]: USER_ACCT pid=5691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:46.377000 audit[5691]: CRED_ACQ pid=5691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:46.377000 audit[5691]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd16401b80 a2=3 a3=0 items=0 ppid=1 pid=5691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:46.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:46.380585 sshd[5691]: Accepted publickey for core from 172.24.4.1 port 38756 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:46.379710 sshd[5691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:46.392932 systemd-logind[1133]: New session 25 of user core. Dec 13 03:41:46.394075 systemd[1]: Started session-25.scope. Dec 13 03:41:46.413000 audit[5691]: USER_START pid=5691 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:46.416000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:47.272531 sshd[5691]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:47.274000 audit[5691]: USER_END pid=5691 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:47.274000 audit[5691]: CRED_DISP pid=5691 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:47.278761 systemd[1]: sshd@24-172.24.4.167:22-172.24.4.1:38756.service: Deactivated successfully. Dec 13 03:41:47.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.167:22-172.24.4.1:38756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:47.281185 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 03:41:47.283342 systemd-logind[1133]: Session 25 logged out. Waiting for processes to exit. Dec 13 03:41:47.286571 systemd-logind[1133]: Removed session 25. Dec 13 03:41:48.971000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:48.971000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba32c0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:48.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:48.971000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:48.971000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ba3340 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:48.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:48.979000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:48.979000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eba4e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:48.979000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:49.054000 audit[1888]: AVC avc: denied { watch } for pid=1888 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 03:41:49.054000 audit[1888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eba800 a2=fc6 a3=0 items=0 ppid=1762 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c803 key=(null) Dec 13 03:41:49.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 03:41:52.285575 systemd[1]: Started sshd@25-172.24.4.167:22-172.24.4.1:38762.service. Dec 13 03:41:52.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.167:22-172.24.4.1:38762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:52.290288 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 03:41:52.291689 kernel: audit: type=1130 audit(1734061312.286:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.167:22-172.24.4.1:38762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:53.794000 audit[5730]: USER_ACCT pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.806485 sshd[5730]: Accepted publickey for core from 172.24.4.1 port 38762 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:41:53.807192 kernel: audit: type=1101 audit(1734061313.794:1496): pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.806000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.825219 kernel: audit: type=1103 audit(1734061313.806:1497): pid=5730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.825372 kernel: audit: type=1006 audit(1734061313.806:1498): pid=5730 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 03:41:53.825451 kernel: audit: type=1300 audit(1734061313.806:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6718ad50 a2=3 a3=0 items=0 ppid=1 pid=5730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.806000 audit[5730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6718ad50 a2=3 a3=0 items=0 ppid=1 pid=5730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:41:53.826196 sshd[5730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:41:53.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:53.840971 kernel: audit: type=1327 audit(1734061313.806:1498): proctitle=737368643A20636F7265205B707269765D Dec 13 03:41:53.846403 systemd-logind[1133]: New session 26 of user core. Dec 13 03:41:53.849583 systemd[1]: Started session-26.scope. Dec 13 03:41:53.862000 audit[5730]: USER_START pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.881117 kernel: audit: type=1105 audit(1734061313.862:1499): pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.881289 kernel: audit: type=1103 audit(1734061313.879:1500): pid=5734 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:53.879000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:54.680487 sshd[5730]: pam_unix(sshd:session): session closed for user core Dec 13 03:41:54.681000 audit[5730]: USER_END pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:54.685900 systemd[1]: sshd@25-172.24.4.167:22-172.24.4.1:38762.service: Deactivated successfully. Dec 13 03:41:54.687531 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 03:41:54.691250 systemd-logind[1133]: Session 26 logged out. Waiting for processes to exit. Dec 13 03:41:54.693312 systemd-logind[1133]: Removed session 26. Dec 13 03:41:54.681000 audit[5730]: CRED_DISP pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:54.707194 kernel: audit: type=1106 audit(1734061314.681:1501): pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:54.707358 kernel: audit: type=1104 audit(1734061314.681:1502): pid=5730 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:41:54.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.167:22-172.24.4.1:38762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:59.691492 systemd[1]: Started sshd@26-172.24.4.167:22-172.24.4.1:46806.service. Dec 13 03:41:59.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.167:22-172.24.4.1:46806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:41:59.698039 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 03:41:59.698277 kernel: audit: type=1130 audit(1734061319.691:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.167:22-172.24.4.1:46806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:01.168116 sshd[5758]: Accepted publickey for core from 172.24.4.1 port 46806 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 03:42:01.166000 audit[5758]: USER_ACCT pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.171188 sshd[5758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 03:42:01.180747 kernel: audit: type=1101 audit(1734061321.166:1505): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.180840 kernel: audit: type=1103 audit(1734061321.167:1506): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.167000 audit[5758]: CRED_ACQ pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.191304 kernel: audit: type=1006 audit(1734061321.167:1507): pid=5758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 03:42:01.167000 audit[5758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12eb3290 a2=3 a3=0 items=0 ppid=1 pid=5758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:01.208926 systemd-logind[1133]: New session 27 of user core. Dec 13 03:42:01.210383 kernel: audit: type=1300 audit(1734061321.167:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12eb3290 a2=3 a3=0 items=0 ppid=1 pid=5758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 03:42:01.209273 systemd[1]: Started session-27.scope. Dec 13 03:42:01.167000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 03:42:01.225787 kernel: audit: type=1327 audit(1734061321.167:1507): proctitle=737368643A20636F7265205B707269765D Dec 13 03:42:01.224000 audit[5758]: USER_START pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.239071 kernel: audit: type=1105 audit(1734061321.224:1508): pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.225000 audit[5760]: CRED_ACQ pid=5760 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:01.249164 kernel: audit: type=1103 audit(1734061321.225:1509): pid=5760 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:02.062886 sshd[5758]: pam_unix(sshd:session): session closed for user core Dec 13 03:42:02.064000 audit[5758]: USER_END pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:02.079057 kernel: audit: type=1106 audit(1734061322.064:1510): pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:02.079195 systemd[1]: sshd@26-172.24.4.167:22-172.24.4.1:46806.service: Deactivated successfully. Dec 13 03:42:02.064000 audit[5758]: CRED_DISP pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:02.090139 kernel: audit: type=1104 audit(1734061322.064:1511): pid=5758 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 03:42:02.080825 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 03:42:02.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.167:22-172.24.4.1:46806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 03:42:02.093413 systemd-logind[1133]: Session 27 logged out. Waiting for processes to exit. Dec 13 03:42:02.095387 systemd-logind[1133]: Removed session 27.